IS

Smith, H. Jeff

Topic Weight Topic Terms
0.966 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.621 privacy information concerns individuals personal disclosure protection concern consumers practices control data private calculus regulation
0.595 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses
0.345 model research data results study using theoretical influence findings theory support implications test collected tested
0.296 financial crisis reporting report crises turnaround intelligence reports cash forecasting situations time status adequately weaknesses
0.259 ethical ethics ambidexterity responsibility codes moral judgments code behavior professional act abuse judgment professionals morality
0.222 project projects failure software commitment escalation cost factors study problem resources continue prior escalate overruns
0.204 research information systems science field discipline researchers principles practice core methods area reference relevance conclude
0.201 instrument measurement factor analysis measuring measures dimensions validity based instruments construct measure conceptualization sample reliability
0.184 information research literature systems framework review paper theoretical based potential future implications practice discussed current
0.166 project projects development management isd results process team developed managers teams software stakeholders successful complex
0.159 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.156 effect impact affect results positive effects direct findings influence important positively model data suggest test
0.132 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences
0.131 case study studies paper use research analysis interpretive identify qualitative approach understanding critical development managerial
0.124 explanations explanation bias use kbs biases facilities cognitive making judgment decisions likely decision important prior
0.120 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.118 executive information article systems presents eis executives overview computer-based scanning discusses investigation support empirical robert
0.112 approach conditions organizational actions emergence dynamics traditional theoretical emergent consequences developments case suggest make organization
0.106 participation activities different roles projects examined outcomes level benefits conditions key importance isd suggest situations

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Dinev, Tamara 2 Allen, Gove N. 1 Burke, Sandra J. 1 Ball, Nicholas L. 1
Depledge, Gordon 1 Hasnas, John 1 Iacovou, Charalambos L. 1 Keil, Mark 1
Milberg, Sandra J. 1 McConnell, Allen R. 1 Thompson, Ronald L. 1 Xu, Heng 1
Privacy 2 project management 2 behavioral economics 1 corporate social responsibility 1
communication quality 1 Code of Research Conduct 1 distortion 1 ethical issues 1
ethical quandries 1 Ethics 1 elaboration likelihood model 1 Information systems development 1
information systems research 1 Information privacy 1 interdisciplinary 1 information system development 1
LISAEL 1 measures 1 multi-theory 1 mum effect 1
macromodels 1 psychology 1 reliability 1 regulation 1
status reporting 1 society 1 theoretical frameworks 1 validity 1
whistle-blowing 1

Articles (7)

Research Commentary‹Informing Privacy Research Through Information Systems, Psychology, and Behavioral Economics: Thinking Outside the ÐAPCOÓ Box (Information Systems Research, 2015)
Authors: Abstract:
    Recently, several researchers provided overarching macromodels to explain individuals' privacy-related decision making. These macromodelsÑand almost all of the published privacy-related information systems (IS) studies to dateÑrely on a covert assumption: responses to external stimuli result in deliberate analyses, which lead to fully informed privacy-related attitudes and behaviors. The most expansive of these macromodels, labeled ÒAntecedentsÐPrivacy ConcernsÐOutcomesÓ (APCO), reflects this assumption. However, an emerging stream of IS research demonstrates the importance of considering principles from behavioral economics (such as biases and bounded rationality) and psychology (such as the elaboration likelihood model) that also affect privacy decisions. We propose an enhanced APCO model and a set of related propositions that consider both deliberative (high-effort) cognitive responses (the only responses considered in the original APCO model) and low-effort cognitive responses inspired by frameworks and theories in behavioral economics and psychology. These propositions offer explanations of many behaviors that complement those offered by extant IS privacy macromodels and the information privacy literature stream. We discuss the implications for research that follow from this expansion of the existing macromodels.
INFORMATION SYSTEMS RESEARCH BEHAVIORS: WHAT ARE THE NORMATIVE STANDARDS? (MIS Quarterly, 2011)
Authors: Abstract:
    Information systems researchers frequently face quandaries in their professional lives. We present the results of a study of academic IS researchers that assesses their judgments and the prevalence of 29 questionable research-related behaviors. We find that the focus and stages of researchers' careers influence their judgments of these behaviors. Membership in the Association for Information Systems (AIS) and adherence to the AIS Code of Research Conduct are also associated with IS researchers' judgments. There is strong evidence to suggest that IS researchers expect to engage in questionable behaviors more in the future than they report having done in the past. As a result of the study, we recommend that the IS community revisit the AIS Code of Research Conduct on a regular basis and take active steps to both educate its members on professional normative standards and to uphold the standards of our community.
INFORMATION PRIVACY RESEARCH: AN INTERDISCIPLINARY REVIEW. (MIS Quarterly, 2011)
Authors: Abstract:
    To date, many important threads of information privacy research have developed, but these threads have not been woven together into a cohesive fabric. This paper provides an interdisciplinary review of privacy-related research in order to enable a more cohesive treatment. With a sample of 320 privacy articles and 128 books and book sections, we classify previous literature in two ways: (1) using an ethics-based nomenclature of normative, purely descriptive, and empirically descriptive, and (2) based on their level of analysis: individual,group, organizational, and societal.Based upon our analyses via these two classification approaches, we identify three major areas in which previous research contributions reside: the conceptualization of information privacy, the relationship between information privacy and other constructs, and the contextual nature of these relationships.As we consider these major areas, we draw three overarching conclusions. First, there are many theoretical developments in the body of normative and purely descriptive studies that have not been addressed in empirical research on privacy. Rigorous studies that either trace processes associated with, or test implied assertions from, these value-laden arguments could add great value. Second, some of the levels of analysis have received less attention in certain contexts than have others in the research to date. Future empirical studies-both positivist and interpretive-could profitably be targeted to these under-researched levels of analysis. Third, positivist empirical studies will add the greatest value if they focus on antecedents to privacy concerns and on actual outcomes. In that light, we recommend that researchers be alert to an overarching macro model that we term APCO (Antecedents ? Privacy Concerns ? Outcomes).
SELECTIVE STATUS REPORTING IN INFORMATION SYSTEMS PROJECTS: A DYADIC-LEVEL INVESTIGATION. (MIS Quarterly, 2009)
Authors: Abstract:
    This study investigates selective reporting behaviors that are pursued by project managers when communicating the status of their information system initiatives to their executives. To understand the types, motivations, impacts, and antecedents of such behaviors, a message-exchange perspective is adopted and the prior literature on IS project status reporting is reviewed. This study incorporates an empirical investigation that examined the influence of five dyadic factors on selective reporting using a survey of 561 project managers. The findings of the study reveal a positive effect of reporting quality on project performance and indicate that a specific type of selective reporting behavior (optimistic biasing) has a degrading effect on reporting quality. Moreover, the findings show that all five antecedents have a significant influence on the propensity of project managers to report selectively. Specifically, the project executive's power, the project manager's trust in the executive, and the executive's quality of communication impact selective reporting directly; the executive's familiarity with the IS development process and the executive's organizational affiliation vis-à-vis that of the project manager have an indirect influence (it is mediated through other factors). The effects of each of these factors on the two types of selective reporting (optimistic and pessimistic biasing) are examined, and the implications of these findings for both researchers and managers are discussed in this article.
Keeping Mum as the Project Goes Under: Toward an Explanatory Model. (Journal of Management Information Systems, 2001)
Authors: Abstract:
    The problem of "runaway" information systems (IS) projects can be exacerbated by the reluctance of organizational members to transmit negative information concerning a project and its status. Drawing upon relevant bodies of literature, this paper presents a model of the reluctance to report negative project news and develops hypotheses to be tested. An experiment, which was designed to test these hypotheses for both internal and external reporting alternatives, is then described. Two factors are manipulated: (1) the level of impact associated with project failure should an individual fail to report negative information, and (2) the level of observed behavioral wrongdoing associated with the project. The results explain a significant portion of the variance in the reluctance to report negative information and suggest that some differences in internal and external reporting behavior. Implications for research and practice are discussed.
ETHICS AND INFORMATION SYSTEMS: THE CORPORATE DOMAIN. (MIS Quarterly, 1999)
Authors: Abstract:
    IS-related ethical quandaries are receiving an increasing amount of attention. However, linkages to the normative theories of business ethics, which can be used in resolving these quandaries in the corporate domain, have been lacking. This paper enumerates and explains the three major normative theories. The stockholder theory holds that managers should resolve ethical quandaries by taking actions which increase the long-term profits to the stockholders without violating the law or engaging in fraud or deception. The stakeholder theory claims that managers should resolve ethical quandaries by balancing stakeholder interests without violating the rights of any stakeholder. The social contract theory states that managers should increase social welfare above what it would be in the absence of the existence of corporations without violating the basic canons of justice. The application of these theories to IS-related ethical quandaries is discussed and a specific quandary dealing with a real-world example--Blockbuster Video's reported plans to market customer lists--is explored in depth. The managerial challenges associated with the theories are then explored.
Information Privacy: Measuring Individuals' Concerns About Organizational Practices. (MIS Quarterly, 1996)
Authors: Abstract:
    Information privacy has been called one of the most important ethical issues of the information age. Public opinion polls show rising levels of concern about privacy among Americans. Against this backdrop, research into issues associated with information privacy is increasing. Based on a number of preliminary studies, it has become apparent that organizational practices, individuals' perceptions of these practices, and societal responses are inextricably linked in many ways. Theories regarding these relationships are slowly emerging. Unfortunately, researchers attempting to examine such relationships through confirmatory empirical approaches may be impeded by the lack of validated instruments for measuring individuals' concerns about organizational information privacy practices. To enable future studies in the information privacy research stream, we developed and validated an instrument that identifies and measures the primary dimensions of individuals' concerns about organizational information privacy practices. The development process included examinations of privacy literature; experience surveys and focus groups; and the use of expert judges. The result was a parsimonious 15-item instrument with four sub-scales tapping into dimensions of individuals concerns about organizational information privacy practices. The instrument was rigorously tested and validated across several heterogenous populations, providing a high degree of confidence in the scales' validity, reliability, and generalizability.