IS

Nunamaker, Jr., Jay F.

Topic Weight Topic Terms
3.249 group support groups meeting gdss decision systems meetings technology study electronic ems task process communication
2.728 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators
1.022 creativity ideas idea creative individual generation techniques individuals problem support cognitive ideation stimuli memory generate
0.893 collaboration support collaborative facilitation gss process processes technology group organizations engineering groupware facilitators use work
0.864 data classification statistical regression mining models neural methods using analysis techniques performance predictive networks accuracy
0.853 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future
0.770 development systems methodology methodologies information framework approach approaches paper analysis use presented applied assumptions based
0.686 intelligence business discovery framework text knowledge new existing visualization based analyzing mining genetic algorithms related
0.632 expert systems knowledge knowledge-based human intelligent experts paper problem acquisition base used expertise intelligence domain
0.592 using subjects results study experiment did conducted task time used experienced use preference experimental presented
0.584 office document documents retrieval automation word concept clustering text based automated created individual functions major
0.551 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using
0.550 group gss support groups systems brainstorming research process electronic members results paper effects individual ebs
0.488 design systems support development information proposed approach tools using engineering current described developing prototype flexible
0.477 implementation systems article describes management successful approach lessons design learned technical staff used effort developed
0.446 modeling models model business research paradigm components using representation extension logical set existing way aspects
0.420 workflow tools set paper management specification command support formal implemented scenarios associated sequence large derived
0.419 research information systems science field discipline researchers principles practice core methods area reference relevance conclude
0.392 search information display engine results engines displays retrieval effectiveness relevant process ranking depth searching economics
0.378 enterprise improvement organizations process applications metaphors packaged technology organization help knows extends improved overcoming package
0.365 systems information research theory implications practice discussed findings field paper practitioners role general important key
0.355 research study different context findings types prior results focused studies empirical examine work previous little
0.350 results study research information studies relationship size variables previous variable examining dependent increases empirical variance
0.349 distributed agents agent intelligent environments environment smart computational environmental scheduling human rule using does embodied
0.340 task fit tasks performance cognitive theory using support type comprehension tools tool effects effect matching
0.335 competitive advantage strategic systems information sustainable sustainability dynamic opportunities capabilities environments environmental turbulence turbulent dynamics
0.333 planning strategic process management plan operational implementation critical used tactical effectiveness number identified activities years
0.310 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.289 process business reengineering processes bpr redesign paper research suggests provide past improvements manage enable organizations
0.283 knowledge application management domain processes kms systems study different use domains role comprehension effective types
0.281 website users websites technostress stress time online wait delay aesthetics user model image elements longer
0.280 decision accuracy aid aids prediction experiment effects accurate support making preferences interaction judgment hybrid perceptual
0.268 systems information management development presented function article discussed model personnel general organization described presents finally
0.262 interface user users interaction design visual interfaces human-computer navigation human need cues studies guidelines laboratory
0.241 adaptation patterns transition new adjustment different critical occur manner changes adapting concept novel temporary accomplish
0.235 differences analysis different similar study findings based significant highly groups popular samples comparison similarities non-is
0.226 information environment provide analysis paper overall better relationships outcomes increasingly useful valuable available increasing greater
0.224 applications application reasoning approach cases support hypertext case-based prototype problems consistency developed benchmarking described efficient
0.222 users user new resistance likely benefits potential perspective status actual behavior recognition propose user's social
0.216 response responses different survey questions results research activities respond benefits certain leads two-stage interactions study
0.215 validity reliability measure constructs construct study research measures used scale development nomological scales instrument measurement
0.202 information systems paper use design case important used context provide presented authors concepts order number
0.200 design artifacts alternative method artifact generation approaches alternatives tool science generate set promising requirements evaluation
0.188 online uncertainty reputation sellers buyers seller marketplaces markets marketplace buyer price signaling auctions market premiums
0.184 use support information effective behaviors work usage examine extent users expertise uses longitudinal focus routine
0.182 web site sites content usability page status pages metrics browsing design use web-based guidelines results
0.181 time use size second appears form larger benefits combined studies reasons selected underlying appear various
0.180 evaluation effectiveness assessment evaluating paper objectives terms process assessing criteria evaluations methodology provides impact literature
0.173 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.173 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance
0.170 identity norms identification symbolic community help sense european social important verification set identities form obtained
0.169 user involvement development users satisfaction systems relationship specific results successful process attitude participative implementation effective
0.168 business large organizations using work changing rapidly make today's available designed need increasingly recent manage
0.165 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.161 decision support systems making design models group makers integrated article delivery representation portfolio include selection
0.152 systems information objectives organization organizational development variety needs need efforts technical organizations developing suggest given
0.147 analysis techniques structured categories protocol used evolution support methods protocols verbal improve object-oriented difficulties analyses
0.146 electronic markets commerce market new efficiency suppliers internet changes marketplace analysis suggests b2b marketplaces industry
0.140 problems issues major involved legal future technological impact dealing efforts current lack challenges subsystem related
0.139 perceived usefulness acceptance use technology ease model usage tam study beliefs intention user intentions users
0.138 article information author discusses comments technology paper presents states explains editor's authors issue focuses topics
0.137 capabilities capability firm firms performance resources business information technology firm's resource-based competitive it-enabled view study
0.135 percent sales average economic growth increasing total using number million percentage evidence analyze approximately does
0.135 recommendations recommender systems preferences recommendation rating ratings preference improve users frame contextual using frames sensemaking
0.132 integration present offer processes integrating current discuss perspectives related quality literature integrated benefits measures potential
0.132 software development maintenance case productivity application tools systems function tool engineering projects effort code developed
0.131 process problem method technique experts using formation identification implicit analysis common proactive input improvements identify
0.128 research studies issues researchers scientific methodological article conducting conduct advanced rigor researcher methodology practitioner issue
0.127 affective concepts role questions game gaming production games logic play shaping frames future network natural
0.126 project projects development management isd results process team developed managers teams software stakeholders successful complex
0.124 structure integration complex business enhancement effects access extent analyzing volatile capture requires occurs pattern enables
0.116 data database administration important dictionary organizations activities record increasingly method collection records considered perturbation requirements
0.115 qualitative methods quantitative approaches approach selection analysis criteria used mixed methodological aspects recent selecting combining
0.113 methods information systems approach using method requirements used use developed effective develop determining research determine
0.110 action research engagement principles model literature actions focus provides developed process emerging establish field build
0.108 online consumers consumer product purchase shopping e-commerce products commerce website electronic results study behavior experience
0.105 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.100 model research data results study using theoretical influence findings theory support implications test collected tested

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Chen, Hsinchun 8 Dennis, Alan R. 6 Vogel, Douglas R. 5 Burgoon, Judee K. 4
George, Joey F. 4 Abbasi, Ahmed 3 Briggs, Robert O. 3 Elkins, Aaron C. 3
Dean, Douglas L. 2 Easton, George K. 2 Lowry, Paul Benjamin 2 Pendergast, Mark O. 2
Sheng, Olivia R. Liu 2 Tyran, Craig K. 2 Twyman, Nathan W 2 Zhang, Zhu 2
Amaravadi, Chandra S. 1 Adkins, Mark 1 Adame, Bradley 1 Briggs, Roberto O. 1
Balthazard, Pierre A. 1 Burgoon, Judee K 1 Brown, Susan A. 1 Chen, Minder 1
Chung, Wingyan 1 Cao, Jinwei 1 Crews, Janna M. 1 Chen, Yan 1
Donovan, Christina 1 Deokar, Amit 1 Derrick, Douglas C. 1 Dang, Yan 1
Dunbar, Norah E. 1 Grohowski, Ron 1 HICKEY, ANN M. 1 Hender, Jillian M. 1
Hu, Paul Jen-Hwa 1 Jessup, Len M. 1 Jr., Robert M. Daniels 1 Jr., Nicholas C. Romand 1
Jensen, Matthew L. 1 Kruse, John 1 K.Burgoon, Judee 1 Lee, James D. 1
Lin, Chienting 1 Lin, Ming 1 Li, Xin 1 Li, Jiexun 1
McGoff, Chris 1 Martz, Ben 1 Mittleman, Daniel D. 1 Mittleman, Daniel 1
Miller, Scot 1 Northcraft, Gregory B. 1 Purdin, Titus D.M. 1 Paranka, David 1
QIN, TIANTIAN 1 Rodgers, Thomas L. 1 Reinig, Bruce A. 1 Sun, Sherry X. 1
TWITCHELL, DOUGLAS P. 1 Vogel, Doug 1 Vreede, Gert-Jan de 1 W.Patton, Mark 1
Zhao, J. Leon 1 Zimbra, David 1 Zhou, Lina 1 Zhang, Yulei 1
Zahedi, Fatemeh Mariam 1 Zeng, Daniel 1
Electronic meeting systems 8 group support systems 7 deception detection 6 credibility assessment 4
Group decision support systems 4 design science 3 strategic management 3 VISUALIZATION 3
creativity 2 concealed information test 2 deception 2 group support system 2
Internet fraud 2 idea quality 2 idea quantity 2 Strategic Planning 2
Anonymity 1 activity modeling 1 analogy 1 assumption reversal 1
attitudes and purchase intentions 1 anti-aliasing 1 avatars 1 automated interviewing systems 1
automated screening kiosk 1 autonomous scientifically controlled screening system 1 business process modeling 1 brainstorming 1
business intelligence 1 Competitive Advantage 1 Collaboration Technology 1 CLUSTERING 1
CODING 1 classification methods 1 construct validity 1 citation analysis 1
classification 1 credibility 1 cognitive fit 1 cognitive load 1
credibility assessment systems 1 computer vision 1 Decision support 1 data-flow anomalies 1
data-flow specification 1 data-flow verification 1 dependency analysis 1 decision support systems 1
data modeling 1 document clustering techniques 1 decision aids 1 decision making 1
defensive response 1 data mining 1 environments 1 electronic meeting system 1
enterprise analysis 1 electronic meeting systems technology adoption 1 experimental research 1 ELICITATION 1
electronic brainstorming 1 electronic markets 1 embodied conversational agents 1 expert systems 1
eye-tracking measures 1 Fake website detection 1 field studies 1 future sales predictions 1
freeze response 1 group process and outcomes 1 group decision support 1 group performance 1
group decision processes 1 genetic algorithm 1 genre theory 1 implementation 1
information systems development 1 integrated office systems 1 intelligent office systems 1 idea generation 1
Information Systems (IS) 1 IS research framework 1 ideation 1 information system evaluation 1
knowledge-based office systems 1 knowledge map 1 kernel-based method 1 knowledge management 1
knowledge mapping 1 kinesic rigidity 1 Leadership 1 laboratory experiment. 1
linguistic cues 1 methods 1 meeting productivity 1 multidimensional scaling 1
machine learning 1 NeuroIS. 1 office knowledge representation 1 office models 1
office system architectures. 1 organizational role of information technology. 1 online trust 1 orienting response 1
process data diagram 1 problem refraining 1 patent management 1 physical security 1
phishing websites 1 phishing 1 qualitative research 1 qualitative data analysis (QDA) methodology 1
research methodology 1 research methodologies 1 re-engineering. 1 REDUCTION 1
research activity 1 research method 1 research paradigm 1 software 1
strategic decision making 1 statistical learning theory 1 software tools 1 software engineering 1
systems development 1 self-organizing maps 1 SELECTION 1 stylometry 1
searching 1 technology acceptance 1 technology diffusion 1 technology transition 1
Technology Transition Model 1 TECHNOLOGY ADOPTION 1 TECHNOLOGY TRANSFER 1 technology transition model (TTM) 1
thinkLets 1 theory of technology dominance 1 unsupervised learning algorithms 1 user anxiety 1
workflow modeling 1 Website classification 1 Web browsing 1 Web community 1
website genres 1

Articles (33)

Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Phishing websites continue to successfully exploit user vulnerabilities in household and enterprise settings. Existing anti-phishing tools lack the accuracy and generalizability needed to protect Internet users and organizations from the myriad of attacks encountered daily. Consequently, users often disregard these tools' warnings. In this study, using a design science approach, we propose a novel method for detecting phishing websites. By adopting a genre theoretic perspective, the proposed genre tree kernel method utilizes fraud cues that are associated with differences in purpose between legitimate and phishing websites, manifested through genre composition and design structure, resulting in enhanced anti-phishing capabilities. To evaluate the genre tree kernel method, a series of experiments were conducted on a testbed encompassing thousands of legitimate and phishing websites. The results revealed that the proposed method provided significantly better detection capabilities than state-of-the-art anti-phishing methods. An additional experiment demonstrated the effectiveness of the genre tree kernel technique in user settings; users utilizing the method were able to better identify and avoid phishing websites, and were consequently less likely to transact with them. Given the extensive monetary and social ramifications associated with phishing, the results have important implications for future anti-phishing strategies. More broadly, the results underscore the importance of considering intention/purpose as a critical dimension for automated credibility assessment: focusing not only on the ÒwhatÓ but rather on operationalizing the ÒwhyÓ into salient detection cues. > >
A Rigidity Detection System for Automated Credibility Assessment (Journal of Management Information Systems, 2014)
Authors: Abstract:
    Credibility assessment is an area in which information systems research can make a major impact. This paper reports on two studies investigating a system solution for automatic, noninvasive detection of rigidity for automated interviewing. Kinesic rigidity has long been a phenomenon of interest in the credibility assessment literature, but until now was infeasible as a veracity indicator in practical use cases. An initial study unexpectedly revealed the occurrence of rigidity in a highly controlled concealed information test setting, prompting the design and implementation of an automated rigidity detection system for interviewing. A unique experimental evaluation supported the system concept. The results of the second study confirmed the kinesic rigidity found in the first, and provided further theoretical insights explaining the rigidity phenomenon. Although additional research is needed, the evidence from this investigation suggests that credibility assessment can benefit from a rigidity detection system.
Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals (Journal of Management Information Systems, 2014)
Authors: Abstract:
    Screening individuals for concealed information has traditionally been the purview of professional interrogators investigating crimes. However, the ability to detect when a person is hiding important information would have high value in many other applications if results could be reliably obtained using an automated and rapid interviewing system. Unfortunately, this ideal has thus far been stymied by practical limitations and inadequate scientific control in current interviewing systems. This study proposes a new class of systems, termed autonomous scientifically controlled screening systems (ASCSS), designed to detect individuals’ purposely hidden information about target topics of interest. These hidden topics of interest could cover a wide range, including knowledge of concealed weapons, privacy violations, fraudulent organizational behavior, organizational security policy violations, preemployment behavioral intentions, organizational insider threat, leakage of classified information, or even consumer product use information. ASCSS represent a systematic synthesis of structured interviewing, orienting theory, defensive response theory, noninvasive psychophysiological measurement, and behavioral measurement. To evaluate and enhance the design principles, we built a prototype automated screening kiosk system and configured it for a physical security screening scenario in which participants constructed and attempted to smuggle a fake improvised explosive device. The positive results provide support for the proposition that ASCSS may afford more widespread application of credibility assessment screening systems.
Are Users Threatened by Credibility Assessment Systems? (Journal of Management Information Systems, 2013)
Authors: Abstract:
    Despite the improving accuracy of agent-based expert systems, human expert users aided by these systems have not improved their accuracy. Self-affirmation theory suggests that human expert users could be experiencing threat, causing them to act defensively and ignore the system's conflicting recommendations. Previous research has demonstrated that affirming an individual in an unrelated area reduces defensiveness and increases objectivity to conflicting information. Using an affirmation manipulation prior to a credibility assessment task, this study investigated if experts are threatened by counterattitudinal expert system recommendations. For our study, 178 credibility assessment experts from the American Polygraph Association (n = 134) and the European Union's border security agency Frontex (n = 44) interacted with a deception detection expert system to make a deception judgment that was immediately contradicted. Reducing the threat prior to making their judgments did not improve accuracy, but did improve objectivity toward the system. This study demonstrates that human experts are threatened by advanced expert systems that contradict their expertise. As more and more systems increase integration of artificial intelligence and inadvertently assail the expertise and abilities of users, threat and self-evaluative concerns will become an impediment to technology acceptance.
Theory-Informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology. (Journal of Management Information Systems, 2012)
Authors: Abstract:
    Effective search support is an important tool for helping individuals deal with the problem of information overload. This is particularly true in the field of nanotechnology, where information from patents, grants, and research papers is growing rapidly. Guided by cognitive fit and cognitive load theories, we develop an advanced Web-based system, Nano Mapper, to support users' search and analysis of nanotechnology developments. We perform controlled experiments to evaluate the functions of Nano Mapper. We examine users' search effectiveness, efficiency, and evaluations of system usefulness, ease of use, and satisfaction. Our results demonstrate that Nano Mapper enables more effective and efficient searching, and users consider it to be more useful and easier to use than the benchmark systems. Users are also more satisfied with Nano Mapper and have higher intention to use it in the future. User evaluations of the analysis functions are equally positive.
Embodied Conversational Agent--Based Kiosk for Automated Interviewing. (Journal of Management Information Systems, 2011)
Authors: Abstract:
    We have created an automated kiosk that uses embodied intelligent agents to interview individuals and detect changes in arousal, behavior, and cognitive effort by using psychophysiological information systems. In this paper, we describe the system and propose a unique class of intelligent agents, which are described as Special Purpose Embodied Conversational Intelligence with Environmental Sensors(SPECIES). SPECIES agents use heterogeneous sensors to detect human physiology and behavior during interactions, and they affect their environment by influencing human behavior using various embodied states (i.e., gender and demeanor), messages, and recommendations. Based on the SPECIES paradigm, we present three studies that evaluate different portions of the model, and these studies are used as foundational research for the development of the automated kiosk. The first study evaluates human-computer interaction and how SPECIES agents can change perceptions of information systems by varying appearance and demeanor. Instantiations that had the agents embodied as males were perceived as more powerful, while female embodied agents were perceived as more likable. Similarly, smiling agents were perceived as more likable than neutral demeanor agents. The second study demonstrated that a single sensor measuring vocal pitch provides SPECIES with environmental awareness of human stress and deception. The final study ties the first two studies together and demonstrates an avatar-based kiosk that asks questions and measures the response using vocalic measurements.
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment. (Journal of Management Information Systems, 2010)
Authors: Abstract:
    The article presents the results of an experiment which involved novices and experts using a decision aid to detect deception in a law enforcement scenario. Both groups improved their assessment accuracy using the decision support system, but tended to ignore it when it contradicted them. The professionals often did not even look at the decision aid's reasons for contradicting them. The theory of technology dominance (TTD) is discussed in this context, and it is noted that the experiment's results contradicted TTD in two respects.
DETECTING FAKE WEBSITES: THE CONTRIBUTION OF STATISTICAL LEARNING THEORY. (MIS Quarterly, 2010)
Authors: Abstract:
    Fake websites have become increasingly pervasive, generating billions of dollars in fraudulent revenue at the expense of unsuspecting Internet users. The design and appearance of these websites makes it difficult for users to manually identify them as fake. Automated detection systems have emerged as a mechanism for combating fake websites, however most are fairly simplistic in terms of their fraud cues and detection methods employed. Consequently, existing systems are susceptible to the myriad of obfuscation tactics used by fraudsters, resulting in highly ineffective fake website detection performance. In light of these deficiencies, we propose the development of a new class of fake website detection systems that are based on statistical learning theory (SLT). Using a design science approach, a prototype system was developed to demonstrate the potential utility of this class of systems. We conducted a series of experiments, comparing the proposed system against several existing fake website detection systems on a test bed encompassing 900 websites. The results indicate that systems grounded in SLT can more accurately detect various categories of fake websites by utilizing richer sets of fraud cues in combination with problem-specific knowledge. Given the hefty cost exacted by fake websites, the results have important implications for e-commerce and online security.
Managing Knowledge in Light of Its Evolution Process: An Empirical Study on Citation Network--Based Patent Classification. (Journal of Management Information Systems, 2009)
Authors: Abstract:
    Knowledge management is essential to modern organizations. Due to the information overload problem, managers are facing critical challenges in utilizing the data in organizations. Although several automated tools have been applied, previous applications often deem knowledge items independent and use solely contents, which may limit their analysis abilities. This study focuses on the process of knowledge evolution and proposes to incorporate this perspective into knowledge management tasks. Using a patent classification task as an example, we represent knowledge evolution processes with patent citations and introduce a labeled citation graph kernel to classify patents under a kernel-based machine learning framework. In the experimental study, our proposed approach shows more than 30 percent improvement in classification accuracy compared to traditional content-based methods. The approach can potentially affect the existing patent management procedures. Moreover, this research lends strong support to considering knowledge evolution processes in other knowledge management tasks.
Stylometric Identification in Electronic Markets: Scalability and Robustness. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    Online reputation systems are intended to facilitate the propagation of word of mouth as a credibility scoring mechanism for improved trust in electronic marketplaces. However, they experience two problems attributable to anonymity abuse--easy identity changes and reputation manipulation. In this study, we propose the use of stylometric analysis to help identify online traders based on the writing style traces inherent in their posted feedback comments. We incorporated a rich stylistic feature set and developed the Writeprint technique for detection of anonymous trader identities. The technique and extended feature set were evaluated on a test bed encompassing thousands of feedback comments posted by 200 eBay traders. Experiments conducted to assess the scalability (number of traders) and robustness (against intentional obfuscation) of the proposed approach found it to significantly outperform benchmark stylometric techniques. The results indicate that the proposed method may help militate against easy identity changes and reputation manipulation in electronic markets.
On the Measurement of Ideation Quality. (Journal of Management Information Systems, 2007)
Authors: Abstract:
    Ideation is a key step in organizational problem solving, so researchers have developed a variety of technological interventions for improving ideation quality, which we define as the degree to which an ideation activity produces ideas that are helpful in attaining a goal. In this paper, we examine the four measures typically used to evaluate ideation quality, including idea-count, sum-of-quality, average-quality, and good-idea-count, and discuss their validity and potential biases. An experimental study comparing three levels of social comparison was used to illustrate the differences in the ideation quality measures and revealed that research conclusions were dependent on the measure used. Based on our analysis of the measures and experimental results, we recommend that only good-idea-count be used as a measure to evaluate ideation treatments and call into question research that has based its findings on the other measures. Finally, we discuss implications for research and other potential approaches to evaluating ideation quality.
Formulating the Data-Flow Perspective for Business Process Management. (Information Systems Research, 2006)
Authors: Abstract:
    Workflow technology has become a standard solution for managing increasingly complex business processes. Successful business process management depends on effective workflow modeling and analysis. One of the important aspects of workflow analysis is the data-flow perspective because, given a syntactically correct process sequence, errors can still occur during workflow execution due to incorrect data-flow specifications. However, there have been only scant treatments of the data-flow perspective in the literature and no formal methodologies are available for systematically discovering data-flow errors in a workflow model. As an indication of this research gap, existing commercial workflow management systems do not provide tools for data-flow analysis at design time. In this paper, we provide a data-flow perspective for detecting data-flow anomalies such as missing data, redundant data, and potential data conflicts. Our data-flow framework includes two basic components: data-flow specification and data-flow analysis; these components add more analytical rigor to business process management.
Interactions Between System Evaluation and Theory Testing: A Demonstration of the Power of a Multifaceted Approach to Information Systems Research. (Journal of Management Information Systems, 2006)
Authors: Abstract:
    Historically, information systems (IS) researchers have questioned which research paradigms, activities, and methods IS research should follow. In this paper, we argue that different research methods and activities may interact with each other, different research paradigms may complement each other due to such interactions, and therefore, a multimethodological, cross-paradigm research approach may result in better IS research than a singular approach. Three existing multimethodological IS research frameworks are reviewed and summarized into an integrated approach. Two types of interactions between different research methods across system evaluation and theory testing research activities are identified. A three-year research study about a computer-based training system for deception detection (Agent99 Trainer) provides a concrete example to demonstrate the existence and research benefits of these two types of interactions, as well as the benefits of a multimethodological, cross-paradigm IS research approach.
A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration. (Journal of Management Information Systems, 2005)
Authors: Abstract:
    Information overload often hinders knowledge discovery on the Web. Existing tools lack analysis and visualization capabilities. Search engine displays often overwhelm users with irrelevant information. This research proposes a visual framework for knowledge discovery on the Web. The framework incorporates Web mining, clustering, and visualization techniques to support effective exploration of knowledge. Two new browsing methods were developed and applied to the business intelligence domain: Web community uses a genetic algorithm to organize Web sites into a tree format; knowledge map uses a multidimensional scaling algorithm to place Web sites as points on a screen. Experimental results show that knowledge map out-performed Kartoo, a commercial search engine with graphical display, in terms of effectiveness and efficiency. Web community was found to be more effective, efficient, and usable than result list. Our visual framework thus helps to alleviate information overload on the Web and offers practical implications for search engine developers.
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication. (Journal of Management Information Systems, 2004)
Authors: Abstract:
    The increased chance of deception in computer-mediated communication and the potential risk of taking action based on deceptive information calls for automatic detection of deception. To achieve the ultimate goal of automatic prediction of deception, we selected four common classification methods and empirically compared their performance in predicting deception. The deception and truth data were collected during two experimental studies. The results suggest that all of the four methods were promising for predicting deception with cues to deception. Among them, neural networks exhibited consistent performance and were robust across test settings. The comparisons also highlighted the importance of selecting important input variables and removing noise in an attempt to enhance the performance of classification methods. The selected cues offer both methodological and theoretical contributions to the body of deception and information systems research.
A Methodology for Analyzing Web-Based Qualitative Data. (Journal of Management Information Systems, 2003)
Authors: Abstract:
    The volume of qualitative data (QD) available via the Internet is growing at an increasing pace and firms are anxious to extract and understand users' thought processes, wants and needs, attitudes, and purchase intentions contained therein. An information systems (IS) methodology to meaningfully analyze this vast resource of QD could provide useful information, knowledge, or wisdom firms could use for a number of purposes including new product development and quality improvement, target marketing, accurate 'user-focused' profiling, and future sales prediction. In this paper, we present an IS methodology for analysis of Internet-based QD consisting of three steps: elicitation, reduction through IS-facilitated selection, coding, and clustering; and visualization to provide at-a-glance understanding. Outcomes include information (relationships), knowledge (patterns), and wisdom (principles) explained through visualizations and drill-down capabilities. First we present the generic methodology and then discuss an example employing it to analyze free-form comments from potential consumers who viewed soon-to-be-released film trailers provided that illustrates how the methodology and tools can provide rich and meaningful affective, cognitive, contextual, and evaluative information, knowledge, and wisdom. The example revealed that qualitative data analysis (QDA) accurately reflected film popularity. A finding is that QDA also provided a predictive measure of relative magnitude of film popularity between the most popular film and the least popular one, based on actual first week box office sales. The methodology and tools used in this preliminary study illustrate that value can be derived from analysis of Internet-based QD and suggest that further research in this area is warranted.
Collaboration Engineering with ThinkLets to Pursue Sustained Success with Group Support Systems. (Journal of Management Information Systems, 2003)
Authors: Abstract:
    Field research and laboratory experiments suggest that, under certain circumstances, people using group support systems (GSS) can be significantly more productive than people who do not use them. Yet, despite their demonstrated potential, GSS have been slow to diffuse across organizations. Drawing on the Technology Transition Model, the paper argues that the high conceptual load of GSS (i.e., understanding of the intended effect of GSS functionality) encourages organizations to employ expert facilitators to wield the technology on behalf of others. Economic and political factors mitigate against facilitators remaining long term in GSS facilities that focus on supporting nonroutine, ad hoc projects. This especially hampers scaling GSS technology to support distributed collaboration. An alternative and sustainable way for organizations to derive value from GSS lies in an approach called 'collaboration engineering': the development of repeatable collaborative processes that are conducted by practitioners themselves. To enable the development of such processes, this paper proposes the thinkLet concept, a codified packet of facilitation skill that can be applied by practitioners to achieve predictable, repeatable patterns of collaboration, such as divergence or convergence. A thinkLet specifies the facilitator's choices and actions in terms of the GSS tool used, the configuration of this tool, and scripted prompts to accomplish a pattern of collaboration in a group. Using thinkLets as building blocks, facilitators can develop and transfer repeatable collaborative processes to practitioners. Given the limited availability of expert facilitators, collaboration engineering with thinkLets may become a sine qua non for organizations to effectively support virtual work teams.
An Examination of the Impact of Stimuli Type and GSS Structure on Creativity: Brainstorming Versus Non-Brainstorming Techniques in a GSS Environment. (Journal of Management Information Systems, 2002)
Authors: Abstract:
    Of the techniques available for idea generation with group support systems (GSS), little research attention has been given to techniques that challenge problem assumptions or that use unrelated stimuli to promote creativity. When implementing such techniques with GSS, choices must be made regarding how to configure the GSS to deploy the initial creative stimuli and to present the pool of emerging ideas that act as additional stimuli. This paper reports the results of an experiment that compares Electronic Brainstorming (few unnamed rotating dialogues) with Assumption Reversals (many related stimuli, many named dialogues, free movement among dialogues) and Analogies (many unrelated stimuli, many named dialogues, free movement among dialogues). Analogies produced creative, but fewer, ideas, due to the use of unrelated stimuli. Assumption Reversals produced the most, but less creative, ideas, possibly due to fragmentation of the group memory and cognitive inertia caused by lack of forced movement among dialogues.
Verifying the Proximity and Size Hypothesis for Self-Organizing Maps. (Journal of Management Information Systems, 1999)
Authors: Abstract:
    The Kohonen Self-Organizing Map (SOM) is an unsupervised learning technique for summarizing high-dimensional data so that similar inputs are, in general, mapped close to one another. When applied to textual data, SOM has been shown to be able to group together related concepts in a data collection and to present major topics within the collection with larger regions. This article presents research in which the authors sought to validate these properties of SOM, called the Proximity and Size Hypotheses, through a user evaluation study. Building upon their previous research in automatic concept generation and classification, they demonstrated that the Kohonen SOM was able to perform concept clustering effectively, based on its concept precision and recall 7 scores as judged by human experts. They also demonstrated a positive relationship between the size of an SOM region and the number of documents contained in the region. They believe this research has established the Kohonen SOM algorithm as an intuitively appealing and promising neural-network-based textual classification technique for addressing part of the longstanding "information overload" problem.
A Technology Transition Model Derived from Field Investigation of GSS Use Aboard the U.S.S. CORONADO. (Journal of Management Information Systems, 1998)
Authors: Abstract:
    There are several thousand group support systems (GSS) installations worldwide, and, while that number is growing, GSS has not yet achieved critical mass. One reason may be that it can take one to three years for an organization to complete a transition to GSS. Studying GSS transition in the field could yield insights that would allow for faster, lower-risk transitions elsewhere. This article presents a thirty-two-month qualitative field investigation of an effort to introduce GSS into the daily work of the staff of the U.S. Navy's Commander, Third Fleet. Using the principles of action research, the project began with interventions based on the precepts of the Technology Acceptance Model (TAM). The goal of the interventions was to engender sufficient acceptance for GSS to create a self-sustaining, growing community of GSS users. Throughout the study, building on a base of experience developed in other private- and public-sector transition projects, we revised and extended TAM based on insights that emerged in the field. The resulting model, the Technology Transition Model (TTM), frames acceptance as a multiplicative function of the magnitude and frequency of the perceived net value of a proposed change, moderated by the perceived net value associated with the transition period itself. TTF frames net value as having a number of dimensions, including cognitive, economic, political, social, affective, and physical. It posits that cognitive net value derives from at least three sources: changes in access, technical, and conceptual attention loads. GSS transition proceeded at different speeds in different segments of the Third Fleet; the intelligence and battle staffs became self-sustaining within weeks, while others are still not self-sustaining. TTM appears to explain the differences that emerged in the Navy community. The articles presents TAM, then argues the propositions of TTM. It then presents background information about Third Fleet, and describes critical incidents in the transition effort that give rise to the model. It summarizes the lessons learned in the field by comparing the differing transition trajectories among Fleet staff segments in light of the model.
Group Support Systems for Strategic Planning. (Journal of Management Information Systems, 1997)
Authors: Abstract:
    Strategic planning is typically performed by groups of managers. Group support systems (GSS), an information technology designed to improve group work, may therefore have useful application to strategic planning. In this paper, the application of GSS is examined with respect to four dimensions: process support, process structure, task support, and task structure. A GSS may assist the communication aspects of group meetings by providing process support to improve interaction among participants and process structure to direct the pattern or content of the discussion. GSS may also provide task structure, such as structured analysis and modeling techniques, and task support, such as access to important task information. This paper reports on the use of a GSS in the strategic planning processes of thirty organizations. The ability of the GSS to provide process support was found to be the most important contributor to strategic planning success, with task structure and process structure secondary. Task support contributed little. Those organizations that made greater use of electronic communication, structured problem analysis techniques, and structured meeting processes reported greater success.
Enabling the Effective Involvement of Multiple Users: Methods and Tools for Collaborative Software Engineering. (Journal of Management Information Systems, 1997)
Authors: Abstract:
    The paper presents results of ongoing research to support effective user involvement during systems development projects. The Collaborative Software Engineering Methodology is presented as a framework that contains mechanisms to support three layers of user involvement: selected user representatives, user groups, and the broader user community. Productivity and user participation of traditional group meetings have been limited by chauffeured facilitation and by support of single-user tools designed for analysts rather than users. The paper introduces electronic meeting systems (EMS) modeling tools designed to allow users to work in parallel to contribute directly during meetings. These tools are easy to use while containing support features traditionally associated with CASE tools. The methodology includes a sequence of requirements abstractions that users engage directly including activity models, data models, scenarios, system use eases, and prototypes. This methodology is designed to help organizations respond to today's rapidly changing information processing needs.
Lessons from a Dozen Years of Group Support Systems Research: A Discussion of Lab and Field Findings. (Journal of Management Information Systems, 1996)
Authors: Abstract:
    During the past dozen years, researchers at the University of Arizona have built six generations of group support systems software, conducted over 150 research studies, and facilitated over 4,000 projects. This article reports on lessons learned through that experience. It begins by presenting a theoretical foundation for the Groupware Grid, a tool for designing and evaluating GSS. It then reports lessons from nine key domains: (1) GSS in organizations; (2) cross-cultural and multicultural issues; (3) designing GSS software; (4) collaborative writing; (5) electronic polling; (6) GSS facilities and room design; (7) leadership and facilitation; (8) GSS in the classroom; and (9) business process reengineering.
Methodology-Driven Use of Automated Support in Business Process Re-Engineering. (Journal of Management Information Systems, 1993)
Authors: Abstract:
    This article describes a three-month pilot project to model and re-engineer an internal business unit of a major multinational firm using Enterprise Analyzer, a methodology and supporting group software tool for modeling and analyzing business processes. The methodology combines collaborative model building with creative problem reframing to enable multilevel, cross-functional business teams to quickly examine and redesign business processes. The tools developed for this project extend the capabilities of existing electronic meeting system technology to help groups build complex representations of their organization. The results of this pilot project suggest that the methodology and supporting tools can be effectively applied to re-engineer business processes, but also suggest the need for better ways to help groups accept innovative ideas. Many innovative ideas were generated, but few made it past the participants' evaluation and into the project's final recommendations.
AEI: A Knowledge-Based Approach to Integrated Office Systems. (Journal of Management Information Systems, 1992)
Authors: Abstract:
    Although various attempts have been made in the past to introduce office systems and office models, they have been limited in one or several ways: they have not been based on integrated views; no models were developed or the models were artificial; they have been limited in scope; they used restrictive representation schemes; they were not intelligent; they were not user-friendly. Our research attempts to address these issues with: an integrated view of the office; a model tied to the nature of office activity; integration across various office domains; and a knowledge base. Intelligence is supplied from the interface and from the planner, as well as from the domain knowledge. An important component of the domain knowledge is the functional structure which captures activity relationships with a uniform representation scheme. Users can access explanations about functions of the office and can add comments on them. The realization of these concepts in a prototype system is discussed.
The Application of Electronic Meeting Technology to Support Strategic Management. (MIS Quarterly, 1992)
Authors: Abstract:
    Strategic management is often performed by groups of managers. By improving the communication process of such groups, strategic management might be enhanced. This paper investigates the application of electronic meeting systems (EMS) technology to support strategic management. Eight cases involving five organizations using an EMS facility are examined to: (1) determine how organizational groups use EMS for strategic management, (2) assess the overall effectiveness and efficiency of the EMS approach to strategic management, and (3) assess the capability of an EMS to address a variety of group process and communication issues in an organizational context. The findings indicate that EMS technology can address a number of the theoretical and practical concerns associated with strategic management meetings involving large heterogeneous groups of managers. Implications for the design of EMS to support strategic management are discussed, and opportunities for future research are identified.
Supporting the Search for Competitive Advantage. (Journal of Management Information Systems, 1991)
Authors: Abstract:
    Managers are beginning to realize that the search for opportunities to create competitive advantage should be included as one part of the overall strategic planning process. Since the search for competitive advantage is often undertaken by large groups of managers drawn from many departments and organizational levels within the firm, recent developments in information technology to support group work may be useful. In this paper, we examine the ability of this technology to support the search for competitive advantage. Building on prior research on competitive advantage and group processes, we propose a three-stage process to guide the search for competitive advantage, describe an information system to support this process, and examine the experiences of five groups from three firms that have used this system to support this process. In general, the experiences of these groups suggest that this technology can be useful in supporting the search for competitive advantage.
A Study of Collaborative Group work with and Without Computer-Based Support. (Information Systems Research, 1990)
Authors: Abstract:
    As organizational environments become more turbulent and as managers spend more time in meetings in an effort to deal with that turbulence, using information technology to support meetings has become more important. This paper reports on an experiment that compared meetings supported by information technology to meetings with conventional manual support only. The experiment differs from most previous group decision support system (GDSS) experiments in that solutions to the task it used could be objectively scored, it introduced assigned leadership as an independent variable, and it is the first GDSS experiment to compare use of a subset of the University of Arizona GroupSystems GDSS tools to manual group methods. In addition to a communication condition (GDSS or manual) and assigned leadership, the experiment also investigated the effects of anonymity on group process and outcomes. The experiment found that GDSS groups were less likely to reach consensus, took more time to reach a decision, and had more equal levels of member participation than manual groups. No main effects were found for assigned leadership or anonymity.
A Comparison of Laboratory and Field Research in the Study of Electronic Meeting Systems. (Journal of Management Information Systems, 1990)
Authors: Abstract:
    Research into the use of Electronic Meeting Systems (EMS) has rapidly increased over the past few years. However, EMS laboratory experiments have often drawn very different conclusions about the effects of EMS use than have EMS field studies--conclusions that at first appear inconsistent. By examining the differences in the design of prior EMS studies, we attempt to better understand the factors that affect the use of EMS technology. It is our contention that these differences in findings are not inconsistent, but rather they reflect different situations that researchers have studied. We identify 24 potentially important differences in organizational contexts, group characteristics, tasks, and EMS environments. In planning future research, EMS researchers need to make explicit design decisions for each of these aspects, and to consider how those choices may affect research results. An analysis of these differences suggests several approaches to enhance the design of future laboratory experiments and field studies.
Systems Development in Information Systems Research. (Journal of Management Information Systems, 1990)
Authors: Abstract:
    In this paper, the use of systems development as a methodology in information systems (is) research is described and defended. A framework to explain the nature of systems development as a research methodology in is research is proposed. Use of this methodology in the engineering field in general is compared with its use specifically in computer science and computer engineering. An integrated program for conducting IS research that incorporates theory building, systems development, experimentation, and observation is proposed. Progress in several application domains is reviewed to provide a basis upon which to argue that systems development is a valid research methodology. A systems development research process is presented from a methodological perspective. Software engineering, which is the basic method of applying the systems development research methodology, is then discussed. It is the authors' belief that systems development and other research methodologies are complementary and that an integrated multi-dimensional and multimethodological approach will generate fruitful is research results. The premise is that research contributions can result from systems development, experimentation, observation, and performance testing of the systems under development and that all of these research approaches are needed to investigate different aspects of the research question.
Using Two Different Electronic Meeting System Tools for the Same Task: An Experimental Comparison. (Journal of Management Information Systems, 1990)
Authors: Abstract:
    Various aspects of the design and use of Electronic Meeting Systems (EMS) have been investigated in laboratory and field studies, but until now no one has systematically investigated the role of EMS software on group performance. The current study compares two different EMS software tools in a controlled experiment. Dependent variables are decision quality, number of unique alternatives generated, satisfaction, and consensus. The study found that one software tool produced better quality solutions to a combination creativity and intellective task, but the other helped generate more unique alternatives. Each tool worked best on the task for which it was designed. The findings support the authors' premise that there should be a match between the EMS software tool and the task to be performed. The findings have several implications for the design of EMS software.
Implementing Electronic Meeting Systems at IBM: Lessons Learned and Success Factors. (MIS Quarterly, 1990)
Authors: Abstract:
    The article discusses the implementation of the electronic meeting systems (EMS) at the International Business Machines Corp. (IBM) in an alliance with Tucson-based University of Arizona. EMS' apply information technology to support the meeting process and help accomplish goals. The project at the University of Arizona has grown from initial support lore single site to 33 IBM sites and over 15,000 people have used the expanding EMS tool kit. The author states that EMS has improved group performance by an average of 55 percent. The site that was picked for the EMS Phase 1 installation and evaluation was a multi-line manufacturing plant with about 5,000 employees located in the rural setting of Owego, New York. Article topics also include Phase 2 EMS operationalization and the success factors of EMS.
Information Technology to Support Electronic Meetings. (MIS Quarterly, 1988)
Authors: Abstract:
    As managers spend more of their time in meetings, the study of information technology to support meetings becomes increasingly important. Several unique systems to support meetings electronically have been developed in industry and universities. The PLEXSYS systems at the University of Arizona have been operational since 1985 and are now being implemented in industrial sites. This article proposes and defines a new term for information technology systems that support group meetings: electronic meeting systems (EMS). EMS are more than group decision support systems (GDSS): they support more tasks than just decision making; they focus on communication. They move beyond the GDSS decision room, where groups must meet at the same time in the same place, to meetings that can be conducted across time and space. The article then presents a model of the EMS concept, which has three components: group process and outcomes; methods; and environment. Each of these components is explained in turn, and the implications derived from their study to date are discussed. Finally, the implementation of information technology for meeting support and its use in corporate settings will be addressed, as it has implications for productivity, meeting size, group member participation, and the role of the IS department.