IS

Galletta, Dennis

Topic Weight Topic Terms
0.343 task fit tasks performance cognitive theory using support type comprehension tools tool effects effect matching
0.336 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance
0.255 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.195 problem problems solution solving problem-solving solutions reasoning heuristic theorizing rules solve general generating complex example
0.184 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward
0.164 usage use self-efficacy social factors individual findings influence organizations beliefs individuals support anxiety technology workplace
0.115 human awareness conditions point access humans images accountability situational violations result reduce moderation gain people
0.109 model research data results study using theoretical influence findings theory support implications test collected tested
0.103 commitment need practitioners studies potential role consider difficult models result importance influence researchers established conduct
0.102 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

DêArcy, John 1 Hovav, Anat 1 Malhotra, Yogesh 1 Vessey, Iris 1
affective processes 1 Cognitive fit 1 cognitive processes 1 end-user security 1
general deterrence theory 1 Information acquisition 1 IS misuse 1 IS security 1
information systems acceptance and use 1 multidimensional commitment model 1 Numeric skills 1 personal norms 1
psychological attachment 1 Spatial skills 1 Spatial tasks 1 Symbolic tasks 1
security countermeasures 1 security management 1 social influence theory 1 social norms 1
systems implementation 1 user commitment 1 volitional usage behavior 1

Articles (3)

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. (Information Systems Research, 2009)
Authors: Abstract:
    Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%-75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.
A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior. (Journal of Management Information Systems, 2005)
Authors: Abstract:
    In recent years, several organizations have implemented nonmandatory information and communication systems that escape the conventional behavioral logic of understanding acceptance and usage from a normative perspective of compliance with the beliefs of others. Because voluntary systems require users' volitional behavior, researchers have traced recent implementation failures to a lack of user commitment. However, gaps in our understanding of volitional usage behavior and user commitment have made it difficult to advance theory, research, and practice on this issue. To validate a proposed research model, cross-sectional, between-subjects, and within-subjects field data were collected from 714 users at the time of initial adoption and after six months of extended use. The model explained between 44.1 percent and 58.5 percent of the variance in adoption and usage behavior based upon direct effects of user commitment. Findings suggest that user commitment plays a critical role in the volitional acceptance and usage of such systems. Affective commitment--that is, internalization and identification based upon personal norms--exhibits a sustained positive influence on usage behavior. In contrast, continuance commitment--that is, compliance based upon social norms--shows a sustained negative influence from initial adoption to extended use. Theory development based upon Kelman's social influence framework offers new empirical insights about system users' commitment and how it affects volitional usage behavior.
Cognitive Fit: An Empirical Study of Information Acquisition. (Information Systems Research, 1991)
Authors: Abstract:
    From a broad perspective, our research can be viewed as investigating the fit of technology to task, the user's view of the fit between technology and task, and the relative importance of each to problem-solving or decision-making performance. The technology investigated in this research is the mode of information presentation. Although there has been a considerable amount of research into problem solving using graphs and tables, until recently the circumstances in which each is more effective have been largely unresolved. Recent research has suggested that performance benefits accrue when cognitive fit occurs, i.e., when factors such as the problem representation and problem solving tools match the characteristics of the task. In this paper, we investigate the effects of the basic paradigm of cognitive fit and extensions to the paradigm in a laboratory experiment that examined the nature of subjects' mental representations as well as problem-solving performance. The experiment, using 128 MBA students in two identical, repeated measures designs, produced the following results: • Performance improved markedly for symbolic tasks when the problem representation matched the task • Performance effects also resulted from matching specific problem-solving skills to the problem representation and the task, and to a lesser extent when the skills matched the task alone. • The incremental effects of matching skills to the problem representation and/or the task were small compared with the primary effects of cognitive fit-that of matching problem representation to task. • A large proportion of problem solvers have insight into the concept of supporting tasks with certain types of problem representation and vice versa. • Participants preferred to use tables rather than graphs; they also preferred to solve symbolic rather than spatial problems. • Finally, the problem representation more significantly influenced the mental representation than did task conceptualization. This research suggests that providing decision support systems to satisfy individual managers' desires will not have a large effect on either the efficiency or the effectiveness of problem solving. Designers should, instead, concentrate on determining the characteristics of the tasks that problem solvers must address, and on supporting those tasks with the appropriate problem representations and support tools. Sufficient evidence now exists to suggest that the notion of cognitive fit may be one aspect ofa general theory of problem solving. Suggestions are made for extending the notion of fit to more complex problem-solving environments.