IS

Ramamurthy, K.

Topic Weight Topic Terms
0.352 information processing needs based lead make exchange situation examined ownership analytical improved situations changes informational
0.283 process problem method technique experts using formation identification implicit analysis common proactive input improvements identify
0.261 satisfaction information systems study characteristics data results using user related field survey empirical quality hypotheses
0.258 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.192 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future
0.186 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward
0.182 level levels higher patterns activity results structures lower evolution significant analysis degree data discussed implications
0.174 uncertainty contingency integration environmental theory data fit key using model flexibility perspective environment perspectives high
0.169 factors success information critical management implementation study factor successful systems support quality variables related results
0.155 task fit tasks performance cognitive theory using support type comprehension tools tool effects effect matching
0.148 edi electronic data interchange b2b exchange exchanges interorganizational partners adoption transaction trading supplier factors business
0.130 conflict management resolution conflicts resolve interpersonal consensus robey strategies interdependence optimistic occur degree diversity resolving
0.130 systems information research theory implications practice discussed findings field paper practitioners role general important key
0.126 model research data results study using theoretical influence findings theory support implications test collected tested
0.119 capabilities capability firm firms performance resources business information technology firm's resource-based competitive it-enabled view study
0.115 knowledge application management domain processes kms systems study different use domains role comprehension effective types
0.108 distributed agents agent intelligent environments environment smart computational environmental scheduling human rule using does embodied
0.105 empirical model relationships causal framework theoretical construct results models terms paper relationship based argue proposed
0.105 adoption diffusion technology adopters innovation adopt process information potential innovations influence new characteristics early adopting

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Premkumar, G. 2 Chiravuri, Ananth 1 Chen, Yan 1 Jain, Hemant 1
Nilakanta, Sree 1 Nazareth, Derek 1 Ryu, Hwa-Suk 1 Saunders, Carol S. 1
Wen, Kuang-Wei 1 Yasai-Ardekani, Masoud 1
cluster analysis 2 interorganizational systems 2 autonomy 1 B2B 1
centralization 1 cognitive conflict 1 consensus generation 1 coercive control 1
compliance theory 1 Data resource management 1 distributed databases 1 distributed processing 1
diffusion of innovations 1 electronic data interchange (EDI) 1 gestalt fit 1 general deterrence theory 1
intersite data dependence 1 innovation theory 1 information processing capability 1 information processing needs 1
information processing theory 1 information security policy 1 knowledge capture 1 punishment 1
remunerative control 1 reward 1 systems implementation 1 strategic fit 1
supply chain 1 virtual teams. 1

Articles (5)

Organizations' Information Security Policy Compliance: Stick or Carrot Approach? (Journal of Management Information Systems, 2012)
Authors: Abstract:
    Companies' information security efforts are often threatened by employee negligence and insider breach. To deal with these insider issues, this study draws on the compliance theory and the general deterrence theory to propose a research model in which the relations among coercive control, which has been advocated by scholars and widely practiced by companies; remunerative control, which is generally missing in both research and practice; and certainty of control are studied. A Web-based field experiment involving real-world employees in their natural settings was used to empirically test the model. While lending further support to the general deterrence theory, our findings highlight that reward enforcement, a remunerative control mechanism in the information systems security context, could be an alternative for organizations where sanctions do not successfully prevent violation. The significant interactions between punishment and reward found in the study further indicate a need for a more comprehensive enforcement system that should include a reward enforcement scheme through which the organizational moral standards and values are established or reemphasized. The findings of this study can potentially be used to guide the design of more effective security enforcement systems that encompass remunerative control mechanisms.
Cognitive Conflict and Consensus Generation in Virtual Teams During Knowledge Capture: Comparative Effectiveness of Techniques. (Journal of Management Information Systems, 2011)
Authors: Abstract:
    Effective knowledge management has been increasingly cited as critical for businesses to compete successfully. Knowledge acquisition/capture, the first step in knowledge management, continues to be a bottleneck and is exacerbated when experts are geographically distributed. Furthermore, knowledge from multiple experts is likely to generate inconsistent knowledge for a given problem domain. There is thus a compelling need to generate consensus by resolving inconsistencies and conflicts that may occur among experts during the process of knowledge acquisition. This process is more challenging when dealing with virtual teams of experts. This study addresses task-based or cognitive conflicts among experts. A key objective of this study is to examine the effectiveness of two cognitive techniques-the repertory grid (or RepGrid) and Delphi-in generating consensus among experts during the knowledge capture process. A field experiment with geographically distributed real-world network experts involving multiple rounds of interaction over an extended period of time was conducted. Findings from this research indicate that, in the short run, Delphi works better than the RepGrid in reducing conflict and generating consensus. However, the RepGrid technique appears to perform better in the long run. We find similar results for satisfaction with the process and outcome. Our findings also indicate that experts using the RepGrid technique elicited more knowledge as well as higher-quality knowledge than experts using the Delphi technique. To sum up, our study indicates that RepGrid is superior to Delphi, and therefore managers should seriously consider the use of RepGrid in capturing knowledge from multiple and distributed experts when dealing with complex real-world issues.
Information Processing View of Organizations: An Exploratory Examination of Fit in the Context of Interorganizational Relationships. (Journal of Management Information Systems, 2005)
Authors: Abstract:
    This study uses Galbraith's information processing theory to examine the fit between information processing needs and information processing capability in an interorganizational supply chain context and to examine its effect on performance. Information processing needs are assessed based on various characteristics of the product and procurement environment and information processing capabilities are assessed by the level of information technology support for various activities in the procurement life cycle. A taxonomy of information processing needs and information processing capabilities is developed. The effect of the fit between information processing needs and capabilities on procurement performance is examined. The study collected data on 142 products through personal interviews and surveys, used cluster analytic techniques to develop taxonomies, and analysis of" variance (ANOVA) to test the fit between needs and capability, modeled as an interaction effect. The results reveal two clusters for information processing needs and three clusters for information processing capability. ANOVA results show that the interactive effect of information needs and capability has a significant effect on performance. supporting our fit theory.
Success of Data Resource Management in Distributed Environments: An Empirical Investigation. (MIS Quarterly, 1998)
Authors: Abstract:
    The trend toward distributed processing has significantly increased the awareness of data as a key corporate resource and underscored the importance of its management. In spite of this, there is a lack of empirical investigation of issues related to data resource management (DRM) in distributed processing environments. Being perhaps the first empirical attempt, this exploratory study identifies four information systems (IS) variables related to DRM in a distributed environment. It also seeks to examine the notion of gestalt fit to describe the nature of the relationships among these variables. In addition, the study evaluates whether internally congruent groups outperform their opposites in realizing DRM success. The results of cluster analysis support the view of gestalt fit by identifying five clusters. The results also suggest that organizations represented by a well-blended configuration of high intersite data dependence, high centralization of IS decisions, high concentration IS resources at the central site, and low DRM-related autonomy granted to local sites appear to realize a greater degree of DRM success than the other groups. The implications of the study are discussed, and further research directions are proposed.
Implementation of Electronic Data Interchange: An Innovation Diffusion Perspective. (Journal of Management Information Systems, 1994)
Authors: Abstract:
    Electronic data interchange (EDI) has dramatically changed the manner in which interorganizational transactions are conducted. The electronic exchange of transaction documents has had a significant impact on business practices, particularly in the sales and purchase/merchandising functions of organizations. EDT brings in many benefits to the organization such as reduced costs, faster turnaround, better customer service, and in some firms strategic advantage over their competitors. Despite these benefits, firms still have problems in implementing EDI. This study, drawing upon research in innovation theory and information systems, examines the relationship between various innovation characteristics (complexity, two forms of compatibility, costs, relative advantage, and communicability) and various attributes of diffusion (adaptation, internal diffusion, external diffusion, and implementation success) of EDT in organizations. The data for the study were collected from a large-scale field survey of 201 firms in the United States that have implemented EDI. Two senior executives, one from information systems (IS) and the other from the sales/purchase function, provided matched responses to a questionnaire that measured the various research constructs. The results of the multivariate regression analyses revealed that relative advantage, costs, and technical compatibility were the major predictors of adaptation. While relative advantage and duration were important predictors of internal diffusion, technical compatibility and duration were found to be important predictors of external diffusion. Both forms of compatibility (technical and organizational) and costs were found to be important predictors of implementation success in EDI.