IS

Galletta, Dennis F.

Topic Weight Topic Terms
0.516 website users websites technostress stress time online wait delay aesthetics user model image elements longer
0.467 model research data results study using theoretical influence findings theory support implications test collected tested
0.435 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance
0.385 errors error construction testing spreadsheet recovery phase spreadsheets number failures inspection better studies modules rate
0.363 exploration climate technology empowerment explore features trying use employees intention examining work intentions exploring autonomy
0.316 perceived results study field individual support effects microcomputer pressure external usefulness test psychological obligations characteristics
0.314 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.302 research journals journal information systems articles academic published business mis faculty discipline analysis publication management
0.252 effect impact affect results positive effects direct findings influence important positively model data suggest test
0.249 web site sites content usability page status pages metrics browsing design use web-based guidelines results
0.247 using subjects results study experiment did conducted task time used experienced use preference experimental presented
0.216 personalization content personalized willingness web pay online likelihood information consumers cues customers consumer services elaboration
0.199 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.195 factors success information critical management implementation study factor successful systems support quality variables related results
0.194 trust trusting study online perceived beliefs e-commerce intention trustworthiness relationships benevolence initial importance trust-building examines
0.191 online consumers consumer product purchase shopping e-commerce products commerce website electronic results study behavior experience
0.188 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences
0.187 motivation intrinsic theory social extrinsic expectancy motivations motivate usage enjoyment rewards consequences reciprocity organizational motivational
0.174 role roles gender differences women significant play age men plays sample differ played vary understand
0.170 development systems methodology methodologies information framework approach approaches paper analysis use presented applied assumptions based
0.169 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.165 knowledge application management domain processes kms systems study different use domains role comprehension effective types
0.165 performance results study impact research influence effects data higher efficiency effect significantly findings impacts empirical
0.160 user involvement development users satisfaction systems relationship specific results successful process attitude participative implementation effective
0.159 information environment provide analysis paper overall better relationships outcomes increasingly useful valuable available increasing greater
0.159 strategic benefits economic benefit potential systems technology long-term applications competitive company suggest additional companies industry
0.155 piracy goods digital property intellectual rights protection presence legal consumption music consumers enforcement publisher pirate
0.154 technology organizational information organizations organization new work perspective innovation processes used technological understanding technologies transformation
0.147 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.144 instrument measurement factor analysis measuring measures dimensions validity based instruments construct measure conceptualization sample reliability
0.140 software development product functionality period upgrade sampling examines extent suggests factors considered useful uncertainty previous
0.140 group gss support groups systems brainstorming research process electronic members results paper effects individual ebs
0.137 perceived usefulness acceptance use technology ease model usage tam study beliefs intention user intentions users
0.135 online users active paper using increasingly informational user data internet overall little various understanding empirical
0.135 use question opportunities particular identify information grammars researchers shown conceptual ontological given facilitate new little
0.134 information systems paper use design case important used context provide presented authors concepts order number
0.133 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward
0.129 goals goal research setting achieve accounting behavior multiple meet make constraints differing ability particularly association
0.128 quality different servqual service high-quality difference used quantity importance use measure framework impact assurance better
0.119 ethical ethics ambidexterity responsibility codes moral judgments code behavior professional act abuse judgment professionals morality
0.119 cognitive style research rules styles human individual personality indicates stopping users composition analysis linguistic contextual
0.118 computing end-user center support euc centers management provided users user services organizations end satisfaction applications
0.114 effects effect research data studies empirical information literature different interaction analysis implications findings results important
0.112 results study research information studies relationship size variables previous variable examining dependent increases empirical variance
0.111 financial crisis reporting report crises turnaround intelligence reports cash forecasting situations time status adequately weaknesses
0.103 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative
0.100 performance firm measures metrics value relationship firms results objective relationships firm's organizational traffic measure market

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Moody, Gregory D. 4 Lowry, Paul Benjamin 3 Polak, Peter 2 Butler, Brian S. 1
Barlow, Jordan B. 1 Boss, Scott R. 1 Durcikova, Alexandra 1 Everard, Andrea 1
Fadel, Kelly J. 1 Gaskin, James 1 Heckman Jr., R. L. 1 Henry, Raymond M. 1
Humpherys, Sean L. 1 Hartzel, Kathleen S. 1 Johnson, Susan E. 1 Joseph, Jimmie L. 1
Kirsch, Laurie J. 1 Lopes, Alexandre B. 1 McCoy, Scott 1 Malhotra, Yogesh 1
Peace, A. Graham 1 Rustagi, Sandeep 1 Thong, James Y. L. 1 Vance, Anthony 1
Wilson, David W. 1
ATTITUDES 1 AIS Senior Scholars basket of journals 1 anonymity 1 behavior 1
composite ranking or rating 1 computer ethics 1 consumer assessments 1 computer abuse 1
coping 1 Developers 1 deterrence theory 1 End-User computing 1
End-User development 1 ELECTRONIC COMMERCE 1 exploitation 1 exploration 1
expert opinion 1 electronic spreadsheets. information system audits 1 expected utility theory 1 E-Commerce 1
endogenous motivations 1 fear appeals 1 h-index 1 humanÐcomputer interaction 1
impact factor 1 Information systems journal rankings 1 intention to purchase 1 IT artifacts 1
information scent 1 Internet latent semantic analysis 1 Information security 1 intentions 1
journal quality 1 knowledge management systems 1 locus of causality 1 model comparison 1
nomologies for dissemination of scientific knowledge 1 online content 1 organismic integration theory 1 organizational failure 1
organizational governance 1 online anxiety 1 online stress 1 PERFORMANCE 1
psychological climate 1 protection motivation theory 1 Role theory 1 Response Time 1
risk 1 scientometrics 1 self-citation 1 SenS-6 1
SenS-8 1 spreadsheet validation. 1 software piracy 1 Service value 1
System adoption 1 system use 1 system user motivations 1 system backups 1
technical support 1 theory of planned behavior 1 trust in e-commerce 1 technology-enabled learning 1
trust 1 threat 1 Users 1 Website design 1
Web site credibility 1 Web site presentation flaws 1 Web site quality 1 whistle-blowing 1
whistle-blowing reporting systems 1

Articles (12)

Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes Online (Journal of Management Information Systems, 2015)
Authors: Abstract:
    As competition online increases, website owners investigate ways in which they can attract and retain more users. One avenue is to reduce frustration and stress for the users. Furthermore, many website users are rushed when browsing for specific information on a website. To save time and prevent frustration, website owners should try to maximize information scent, that is, visual, audio, and semantic cues that are meant to lead or guide the user to his or her informational goal. This paper presents and tests a model to predict how information scent can reduce the amount of stress that consumers experience when seeking information under time constraints. The study also demonstrates the relationships between information scent, time constraints, stress, performance, and attitudes toward the website. Results demonstrate that high information scent is an important design goal for a website, and latent semantic analysis can be a useful tool for measuring scent. In addition, rather than an attribute of an overall site, the concept of scent is demonstrated to be dependent on both the website and the task(s) being performed by the user. This finding demonstrates that to maximize users' satisfaction and ability to accomplish their goals, website designers need to determine what tasks users need to accomplish, and to make sure that the links on each page point clearly to the appropriate destination to meet those goals. The latent semantic analysis tool can provide an indication of strength and clarity of the links. Clear links gain even more importance when considering the time constraints of users. Measurable stress explains some of the variance in performance and attitudes. > >
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors (MIS Quarterly, 2015)
Authors: Abstract:
    Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors.
The Drivers in the Use of Online Whistle-Blowing Reporting Systems. (Journal of Management Information Systems, 2013)
Authors: Abstract:
    Online whistle-blowing reporting systems (WBRS) have become increasingly prevalent channels for reporting organizational failures. The Sarbanes-Oxley Act and similar international laws now require firms to establish whistle-blowing (WB) procedures and WBRSs, increasing the importance of WB research and applications. Although the literature has addressed conventional WB behavior, it has not explained or measured the use of WBRSs in online contexts that could significantly alter elements of anonymity, trust, and risk for those using such reporting tools. This study proposes the WBRS model (WBRS-M). Using actual working professionals in an online experiment of hypothetical scenarios, we empirically tested the WBRS-M for reporting computer abuse and find that anonymity, trust, and risk are highly salient in the WBRS context. Our findings suggest that we have an improved WB model with increased explanatory power. Organizations can make WB less of a professional taboo by enhancing WBRS users' perceptions of trust and anonymity. We also demonstrate that anonymity means more than the mere lack of identification, which is not as important in this context as other elements of anonymity.
EVALUATING JOURNAL QUALITY AND THE ASSOCIATION FOR INFORMATION SYSTEMS SENIOR SCHOLARS' JOURNAL BASKET VIA BIBLIOMETRIC MEASURES: DO EXPERT JOURNAL ASSESSMENTS ADD VALUE? (MIS Quarterly, 2013)
Authors: Abstract:
    Information systems journal rankings and ratings help scholars focus their publishing efforts and are widely used surrogates for judging the quality of research. Over the years, numerous approaches have been used to rank IS journals, approaches such as citation metrics, school lists, acceptance rates, and expert assessments. However, the results of these approaches often conflict due to a host of validity concerns. In the current scientometric study, we make significant strides toward correcting for these limitations in the ranking of mainstream IS journals. We compare expert rankings to bibliometric measures such as the ISI Impact Factor™, the h-index, and social network analysis metrics. Among other findings, we conclude that bibliometric measures provide very similar results to expert-based methods in determining a tiered structure of IS journals, thereby suggesting that bibliometrics can be a complete, less expensive, and more efficient substitute for expert assessment. We also find strong support for seven of the eight journals in the Association for Information Systems Senior Scholars' "basket" of journals. A cluster analysis of our results indicates a two-tiered separation in the quality of the highest quality IS journals-with MIS Quarterly, Information Systems Research, and Journal of Management Information Systems belonging, in that order, to the highest A+ tier. Journal quality metrics fit nicely into the sociology of science literature and can be useful in models that attempt to explain how knowledge disseminates through scientific communities.
Knowledge Exploration and Exploitation: The Impacts of Psychological Climate and Knowledge Management System Access. (Information Systems Research, 2011)
Authors: Abstract:
    Firms need to balance efficiency gains obtained through exploiting existing knowledge assets with long-term competitive viability achieved through exploring new knowledge resources. Because the use of knowledge management systems (KMSs) continues to expand, understanding how these systems affect exploration and exploitation practices at the individual level is important to advance both knowledge management theory and practice. This study reports the results of a multi-industry survey investigating how psychological climate and KMS access influence solution reuse (exploitation) and solution innovation (exploration) in the context of technical support work. Our results show that KMS access does not directly determine solution innovation or solution reuse. Instead, KMS access strengthens the positive relationship between a climate for innovation and solution innovation and reverses the positive relationship between a climate for autonomy and solution innovation. The implications for knowledge management research and practice are discussed.
How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    Information technology (IT) adoption research recognizes theoretical limitations in discerning if and when user behavior results from perceived external influences or from personal volition. A clear understanding of this issue requires a precise distinction between mandatory and volitional behaviors. Consistent with organismic integration theory (OIT), this study situates the locus of user motivations inside the user. Drawing upon an endogenous view of behaviors, this research makes three key contributions. First, it develops the theoretical basis for clearly discerning if and when behavior results from perceived external influences or from personal volition. Specifically, it examines how endogenous psychological feelings of autonomy, freedom, conflict, and external pressure can predict and explain user intentions. Second, it proposes that behavior may result from combinations of perceived external influences and personal volition. Recognizing how such "collections of motivations" together influence behavior advances our understanding beyond the "dichotomy" of extrinsic versus intrinsic motivations often adopted in prior research. Third, it proposes that some desired behaviors may be thwarted or impeded by a conflict between perceived external influences and personal volition. The theoretically grounded research model was empirically validated in a field study on Blackboard, a Web-based education platform at a large university. Data collected from a sample of 211 users were tested using structural equation models of initial system adoption and experienced use. Empirical support was found for the proposed model and related hypotheses. The results of this study advance our understanding about user motivations for adopting IT.
When the Wait Isn't So Bad: The Interacting Effects of Website Delay, Familiarity, and Breadth. (Information Systems Research, 2006)
Authors: Abstract:
    Although its popularity is widespread, the Web is well known for one particular drawback: its frequent delay when moving from one page to another. This experimental study examined whether delay and two other website design variables (site breadth and content familiarity) have interaction effects on user performance,attitudes, and behavioral intentions. The three experimental factors (delay, familiarity, and breadth) collectively impact the cognitive costs and penalties that users incur when making choices in their search for target information. An experiment was conducted with 160 undergraduate business majors in a completely counterbalanced, fully factorial design that exposed them to two websites and asked them to browse the sites for nine pieces of information. Results showed that all three factors have strong direct impacts on performance and user attitudes,in turn affecting behavioral intentions to return to the site, as might be expected. A significant three-way interaction was found between all three factors indicating that these factors not only individually impact a user's experiences with a website, but also act in combination to either increase or decrease the costs a user incurs. Two separate analyses support an assertion that attitudes mediate the relationship of the three factors on behavioral intentions. The implications of these results for both researchers and practitioners are discussed. Additional research is needed to discover other factors that mitigate or accentuate the effects of delay, other effects of delay, and under what amounts of delay these effects occur.
Consumer Perceptions and Willingness to Pay for Intrinsically Motivated Online Content. (Journal of Management Information Systems, 2006)
Authors: Abstract:
    Providing profitable online content has been an elusive goal, challenging many companies such as the New York Times, Disney/ABC/ESPN, and Microsoft/Slate. Charging for content has been hit-or-miss, attributable to a lack of generally applicable models of information value. Previous studies in the management information systems literature emphasized extrinsically motivated content (addressing tangible gains), while many sites target intrinsic goals such as entertainment or education. This study examines potential factors influencing willingness to pay for intrinsically motivated online content. Data from 392 college students indicate that even when analyzing content whose potential rewards are intangible and nonquantifiable, potential consumers focus on "expected benefits" as the main antecedent for willingness to pay. Other antecedents, such as perceived quality and provider reputation, only affected willingness to pay indirectly through expected benefits. Researchers are offered a baseline model for future study, and practitioners are advised to provide initial visitors a clear message about benefits of use to entice them to pay for content.
How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store. (Journal of Management Information Systems, 2005)
Authors: Abstract:
    Although there has been a great deal of research on impression formation, little application of that research has been made to electronic commerce. A research model was constructed that hypothesized errors, poor style, and incompleteness to be inversely related to the users' level of perceived quality of an online store. Further, this perceived quality of the online store's Web site would be directly related to users' trust in the store and, ultimately, to users' intentions to purchase from the store. An experimental study with 272 undergraduate and graduate student volunteers supported all the hypotheses. In addition, it was found that the relationship between the factors and perceived quality was mediated by the perception of the flaws. The perception of flaws rather than the actual flaws influenced users' perception of quality. Supplemental analysis also seemed to indicate a pattern of diminishing effects with each subsequent flaw.
Software Piracy in the Workplace: A Model and Empirical Test. (Journal of Management Information Systems, 2003)
Authors: Abstract:
    Theft of software and other intellectual property has become one of the most visible problems in computing today. This paper details the development and empirical validation of a model of software piracy by individuals in the workplace. The model was developed from the results of prior research into software piracy, and the reference disciplines of the theory of planned behavior, expected utility theory, and deterrence theory. A survey of 201 respondents was used to test the model. The results indicate that individual attitudes, subjective norms, and perceived behavioral control are significant precursors to the intention to illegally copy software. In addition, punishment severity, punishment certainty, and software cost have direct effects on the individual's attitude toward software piracy, whereas punishment certainty has a significant effect on perceived behavioral control. Consequently, strategies to reduce software piracy should focus on these factors. The results add to a growing stream of information systems research into illegal software copying behavior and have significant implications for organizations and industry groups aiming to reduce software piracy.
Spreadsheet Presentation and Error Detection: An Experimental Study. (Journal of Management Information Systems, 1996)
Authors: Abstract:
    The pervasiveness and impact of electronic spreadsheets have generated serious concerns about their integrity and validity when used in significant decision-making settings. Previous studies have shown that few of the errors that might exist in any given spreadsheet are found, even when the reviewer is explicitly looking for errors. It was hypothesized that differences in the spreadsheets' presentation and their formulas could affect the detection rate of these errors. A sample of 113 M.B.A. students volunteered to search for eight errors planted in a one-page spreadsheet. The spreadsheet was presented in five different formats. A 2 x 2 design specified that four groups were given apparently conventional spreadsheets for comparing paper and screen and the presence or absence of formulas. A fifth group received a special printed spreadsheet with formulas visibly integrated into the spreadsheet printed in a small font directly under the resultant values. As in previous studies, only about 50 percent of the errors were found overall. Subjects with printed spreadsheets found more errors than their colleagues with screen-only spreadsheets but they took longer to do so. There was no discernible formula effect; subjects who were able to refer to formulas did not outperform subjects with access to only the final numbers. The special format did not facilitate error finding. Exploratory analysis uncovered some interesting results. The special experimental integrated paper format appeared to diminish the number of correct items falsely identified as errors. There also seemed to be differences in performance that were accounted for by the subjects' self-reported error-finding strategy. Researchers should focus on other factors that might facilitate error finding, and practitioners should be cautious about relying on spreadsheets' accuracy, even those that have been "audited."
A Role Theory Perspective on End-User Development. (Information Systems Research, 1990)
Authors: Abstract:
    Recent advances in computer technology have been accompanied by significant changes in the roles of both users and developers. One well-known example is end-user development, which here provides a context for the application of role theory to IS issues. A framework is proposed for classifying IS roles in a way that can be used for role behavior analysis. The framework takes the form of a matrix, with activities relating to the construction and use of information systems on one axis, and activities relating to generic organizational levels on the other. Role theory permits analysis of organizational phenomena from either a structural or a process-oriented perspective. Propositions from both perspectives are presented which can be used to direct empirical studies.