Companies' information security efforts are often threatened by employee negligence and insider breach. To deal with these insider issues, this study draws on the compliance theory and the general deterrence theory to propose a research model in which the relations among coercive control, which has been advocated by scholars and widely practiced by companies; remunerative control, which is generally missing in both research and practice; and certainty of control are studied. A Web-based field experiment involving real-world employees in their natural settings was used to empirically test the model. While lending further support to the general deterrence theory, our findings highlight that reward enforcement, a remunerative control mechanism in the information systems security context, could be an alternative for organizations where sanctions do not successfully prevent violation. The significant interactions between punishment and reward found in the study further indicate a need for a more comprehensive enforcement system that should include a reward enforcement scheme through which the organizational moral standards and values are established or reemphasized. The findings of this study can potentially be used to guide the design of more effective security enforcement systems that encompass remunerative control mechanisms.
Effective knowledge management has been increasingly cited as critical for businesses to compete successfully. Knowledge acquisition/capture, the first step in knowledge management, continues to be a bottleneck and is exacerbated when experts are geographically distributed. Furthermore, knowledge from multiple experts is likely to generate inconsistent knowledge for a given problem domain. There is thus a compelling need to generate consensus by resolving inconsistencies and conflicts that may occur among experts during the process of knowledge acquisition. This process is more challenging when dealing with virtual teams of experts. This study addresses task-based or cognitive conflicts among experts. A key objective of this study is to examine the effectiveness of two cognitive techniques-the repertory grid (or RepGrid) and Delphi-in generating consensus among experts during the knowledge capture process. A field experiment with geographically distributed real-world network experts involving multiple rounds of interaction over an extended period of time was conducted. Findings from this research indicate that, in the short run, Delphi works better than the RepGrid in reducing conflict and generating consensus. However, the RepGrid technique appears to perform better in the long run. We find similar results for satisfaction with the process and outcome. Our findings also indicate that experts using the RepGrid technique elicited more knowledge as well as higher-quality knowledge than experts using the Delphi technique. To sum up, our study indicates that RepGrid is superior to Delphi, and therefore managers should seriously consider the use of RepGrid in capturing knowledge from multiple and distributed experts when dealing with complex real-world issues.
This study uses Galbraith's information processing theory to examine the fit between information processing needs and information processing capability in an interorganizational supply chain context and to examine its effect on performance. Information processing needs are assessed based on various characteristics of the product and procurement environment and information processing capabilities are assessed by the level of information technology support for various activities in the procurement life cycle. A taxonomy of information processing needs and information processing capabilities is developed. The effect of the fit between information processing needs and capabilities on procurement performance is examined. The study collected data on 142 products through personal interviews and surveys, used cluster analytic techniques to develop taxonomies, and analysis of" variance (ANOVA) to test the fit between needs and capability, modeled as an interaction effect. The results reveal two clusters for information processing needs and three clusters for information processing capability. ANOVA results show that the interactive effect of information needs and capability has a significant effect on performance. supporting our fit theory.
The trend toward distributed processing has significantly increased the awareness of data as a key corporate resource and underscored the importance of its management. In spite of this, there is a lack of empirical investigation of issues related to data resource management (DRM) in distributed processing environments. Being perhaps the first empirical attempt, this exploratory study identifies four information systems (IS) variables related to DRM in a distributed environment. It also seeks to examine the notion of gestalt fit to describe the nature of the relationships among these variables. In addition, the study evaluates whether internally congruent groups outperform their opposites in realizing DRM success. The results of cluster analysis support the view of gestalt fit by identifying five clusters. The results also suggest that organizations represented by a well-blended configuration of high intersite data dependence, high centralization of IS decisions, high concentration IS resources at the central site, and low DRM-related autonomy granted to local sites appear to realize a greater degree of DRM success than the other groups. The implications of the study are discussed, and further research directions are proposed.
Electronic data interchange (EDI) has dramatically changed the manner in which interorganizational transactions are conducted. The electronic exchange of transaction documents has had a significant impact on business practices, particularly in the sales and purchase/merchandising functions of organizations. EDT brings in many benefits to the organization such as reduced costs, faster turnaround, better customer service, and in some firms strategic advantage over their competitors. Despite these benefits, firms still have problems in implementing EDI. This study, drawing upon research in innovation theory and information systems, examines the relationship between various innovation characteristics (complexity, two forms of compatibility, costs, relative advantage, and communicability) and various attributes of diffusion (adaptation, internal diffusion, external diffusion, and implementation success) of EDT in organizations. The data for the study were collected from a large-scale field survey of 201 firms in the United States that have implemented EDI. Two senior executives, one from information systems (IS) and the other from the sales/purchase function, provided matched responses to a questionnaire that measured the various research constructs. The results of the multivariate regression analyses revealed that relative advantage, costs, and technical compatibility were the major predictors of adaptation. While relative advantage and duration were important predictors of internal diffusion, technical compatibility and duration were found to be important predictors of external diffusion. Both forms of compatibility (technical and organizational) and costs were found to be important predictors of implementation success in EDI.