IS

Yuan, Yufei

Topic Weight Topic Terms
0.227 trust trusting study online perceived beliefs e-commerce intention trustworthiness relationships benevolence initial importance trust-building examines
0.194 service services delivery quality providers technology information customer business provider asp e-service role variability science
0.188 perceived usefulness acceptance use technology ease model usage tam study beliefs intention user intentions users
0.176 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.171 instrument measurement factor analysis measuring measures dimensions validity based instruments construct measure conceptualization sample reliability
0.157 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward
0.150 performance results study impact research influence effects data higher efficiency effect significantly findings impacts empirical
0.150 effect impact affect results positive effects direct findings influence important positively model data suggest test
0.143 capabilities capability firm firms performance resources business information technology firm's resource-based competitive it-enabled view study
0.123 systems information research theory implications practice discussed findings field paper practitioners role general important key
0.104 design systems support development information proposed approach tools using engineering current described developing prototype flexible
0.103 alignment strategic business strategy performance technology value organizational orientation relationship information misalignment matched goals perspective
0.102 perceptions attitudes research study impacts importance perceived theory results perceptual perceive perception impact relationships basis

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Connelly, Catherine E. 2 Archer, Norman P. 1 Chan, Yolande E. 1 Guo, Ken H. 1
Head, Milena M. 1 McLaren, Tim S. 1 Turel, Ofir 1
configurational theory 1 design science 1 e-customer service 1 information systems capabilities 1
information systems security 1 justice 1 nonlinear construct relationships 1 nonmalicious security violation 1
online dispute resolution 1 perceived identity match 1 perceived security risk 1 research methods 1
relative advantage for job performance 1 Strategic alignment 1 strategic archetypes 1 technology acceptance 1
trust 1 trust transfer 1 workgroup norms 1

Articles (3)

Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model. (Journal of Management Information Systems, 2011)
Authors: Abstract:
    End users are said to be "the weakest link" in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have examined end user motivation to engage in such behavior. To fill this research gap, in the present study we propose and test empirically a nonmalicious security violation (NMSV) model with data from a survey of end users at work. The results suggest that utilitarian outcomes (relative advantage for job performance, perceived security risk), normative outcomes (workgroup norms), and self-identity outcomes (perceived identity match) are key determinants of end user intentions to engage in NMSVs. In contrast, the influences of attitudes toward security policy and perceived sanctions are not significant. This study makes several significant contributions to research on security-related behavior by (1) highlighting the importance of job performance goals and security risk perceptions on shaping user attitudes, (2) demonstrating the effect of workgroup norms on both user attitudes and behavioral intentions, (3) introducing and testing the effect of perceived identity match on user attitudes and behavioral intentions, and (4) identifying nonlinear relationships between constructs. This study also informs security management practices on the importance of linking security and business objectives, obtaining user buy-in of security measures, and cultivating a culture of secure behavior at local workgroup levels in organizations.
A MULTILEVEL MODEL FOR MEASURING FIT BETWEEN A FIRM'S COMPETITIVE STRATEGIES AND INFORMATION SYSTEMS CAPABILITIES. (MIS Quarterly, 2011)
Authors: Abstract:
    To compete in a highly dynamic marketplace, firms must frequently adapt and align their competitive strategies and information systems. The dominant literature on the strategic fit of a firm's information systems focuses primarily on high-level measures of the strategic fit of a firm's overall IS portfolio and the impact of fit on business performance. This paper addresses the need for a more fine-grained approach for assessing the specific areas of misfit between a firm's competitive strategies and IS capabilities. We describe the design and evaluation of a multilevel strategic fit (MSF) measurement model that enables researchers and practitioners to measure the strategic fit of a firm's information systems at both an overall and a detailed level. The steps in the model include identifying the relevant IS capabilities according to the type of system; measuring the current level of support for each capability using a capabilities instrument; identifying the ideal level of support for each capability using an adaptation of Conant et al.'s (1990) instrument to assess strategic archetype; and comparing the ideal and realized level of support for each capability. Evidence from a multiple case study analysis indicates that the fine-grained assessment of strategic fit can strengthen the validity, utility, and ease of corroboration of the strategic fit measurement outputs. The paper also demonstrates how an iterative design science research approach, with its emphasis on evaluating the utility of prototype artifacts, is well suited to developing field-tested and theoretically grounded measurement models and instruments that are accessible to practitioners. This focus on practical utility in turn provides researchers with results that can be more readily corroborated, thus improving the quality and usefulness of the research findings.
In Justice We Trust: Predicting User Acceptance of E-Customer Services. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    High-quality customer service is an integral part of any successful enterprise, but providing it can be a challenge for online merchants, especially when customers are complaining about each other. This study examines how justice and trust affect user acceptance of e-customer services by conducting an online experiment involving 380 participants. The results suggest that trust in the e-customer service fully mediates the effects of trust in the service representative and procedural justice on intentions to reuse the e-customer service. Furthermore, the effect of distributive justice on trust in the e-customer service was fully mediated by trust in the e-service representative. Finally, the effect of informational justice on user intentions to reuse the e-customer service was partially mediated by trust in the service representative and trust in the e-customer service. Theoretical and practical implications are further discussed.