IS

Zahedi, Fatemeh Mariam

Topic Weight Topic Terms
0.583 cultural culture differences cross-cultural states united status national cultures japanese studies japan influence comparison versus
0.574 web site sites content usability page status pages metrics browsing design use web-based guidelines results
0.423 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.357 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators
0.323 website users websites technostress stress time online wait delay aesthetics user model image elements longer
0.318 validity reliability measure constructs construct study research measures used scale development nomological scales instrument measurement
0.273 factors success information critical management implementation study factor successful systems support quality variables related results
0.255 satisfaction information systems study characteristics data results using user related field survey empirical quality hypotheses
0.243 dynamic time dynamics model change study data process different changes using longitudinal understanding decisions develop
0.236 model research data results study using theoretical influence findings theory support implications test collected tested
0.236 trust trusting study online perceived beliefs e-commerce intention trustworthiness relationships benevolence initial importance trust-building examines
0.235 evaluation effectiveness assessment evaluating paper objectives terms process assessing criteria evaluations methodology provides impact literature
0.233 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.193 case study studies paper use research analysis interpretive identify qualitative approach understanding critical development managerial
0.187 design designs science principles research designers supporting forms provide designing improving address case little space
0.183 dimensions electronic multidimensional game transactions relative contrast channels theory sustained model predict dimension mixture evolutionary
0.180 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.177 instrument measurement factor analysis measuring measures dimensions validity based instruments construct measure conceptualization sample reliability
0.171 health healthcare medical care patient patients hospital hospitals hit health-care telemedicine systems records clinical practices
0.168 human awareness conditions point access humans images accountability situational violations result reduce moderation gain people
0.160 users user new resistance likely benefits potential perspective status actual behavior recognition propose user's social
0.151 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using
0.151 virtual world worlds co-creation flow users cognitive life settings environment place environments augmented second intention
0.143 office document documents retrieval automation word concept clustering text based automated created individual functions major
0.136 project projects development management isd results process team developed managers teams software stakeholders successful complex
0.136 assimilation beliefs belief confirmation aggregation initial investigate observed robust particular comparative circumstances aggregated tendency factors
0.125 phase study analysis business early large types phases support provided development practice effectively genres associated
0.111 control controls formal systems mechanisms modes clan informal used internal literature outsourced outcome theory configuration
0.106 exploration climate technology empowerment explore features trying use employees intention examining work intentions exploring autonomy
0.105 data classification statistical regression mining models neural methods using analysis techniques performance predictive networks accuracy
0.103 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Chen, Yan 2 Abbasi, Ahmed 1 Bansal, Gaurav 1 Chou, Chen-Huei 1
Chen, Hsinchun 1 Jain, Hemant 1 McKinney, Vicki 1 Nunamaker, Jr., Jay F. 1
Pelt, William V. Van 1 Srite, Mark 1 SONG, JAEKI 1 Walia, Nitin 1
Yoon, Kanghyun 1 Zeng, Daniel 1
design science 2 Satisfaction 2 semiology 2 activity theory 1
agency theory 1 analytic hierarchy process 1 augmented virtual doctor office 1 augmented worlds 1
Construct Validity 1 critical success factors 1 critical social theory 1 cultural dimensions 1
change in trust beliefs 1 cultural signifiers 1 credibility assessment 1 coping theory 1
cross-national research 1 Delphi method 1 data mining 1 emotional trust 1
espoused national culture 1 feminine lateral convergence 1 grounded theory 1 genre theory 1
group medical visits 1 hermeneutics 1 Hofstede¿s cultural dimensions 1 health informatics 1
Information Quality 1 Information systems reliability 1 information integration theory 1 Internet fraud 1
Individual users 1 Knowledge interest 1 MTMM Analysis 1 masculine upward divergence 1
myths 1 natural disaster management 1 Ontology 1 phishing websites 1
phishing 1 protection motivation theory 1 polycontextual lens 1 reliability measure. 1
System Quality 1 Second Life virtual worlds 1 security behaviors 1 seeking help 1
security self-efficacy 1 security response efficacy 1 trust attitude 1 utility theory 1
Web Customer 1 Web-Information Satisfaction 1 Web-System Satisfaction 1 Web site images 1
Web-image signifiers theory 1 website evaluation 1 web elements 1 website genres 1

Articles (9)

Augmented Virtual Doctor Office: Theory-based Design and Assessment (Journal of Management Information Systems, 2016)
Authors: Abstract:
    Motivated by rising demands for medical care and the recent trends in medical care delivery, this work designs, develops, and evaluates the augmented virtual doctor office (AVDO). AVDO is intended to provide group medical visits in cyberspace (Cyber GMV). This research adopts the design science approach to design AVDO based on the extension of media naturalness (MN) theory. AVDO is implemented in an augmented world setting that integrates real visual cues with a virtual-world technology (Second Life¨ in this case). The assessment of AVDO is carried out in two ways: (1) through a synthesis of the extended MN theory and technology acceptance theories to assess the relationships of design features as perceived by patients with outcomes that include understanding, perceived effectiveness, trust, and behavior intentions, and (2) through the assessment of AVDO's proof of value and proof of use as a supplementary channel for the delivery of medical care. Our work shows how the design features significantly influence outcomes and patients' positive views of the design's value and use. Theoretical and practical contributions of the work are presented. > >
Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China (MIS Quarterly, 2016)
Authors: Abstract:
    Little is known about the context sensitivity of users' online security perceptions and behaviors to national and individual attributes, and there is inadequate research about the spectrum of users' behaviors in dealing with online security threats. In addressing this gap, this paper draws on two complementary theoretical bases: (1) the contextualization of the protection motivation theory (PMT) to online security behavior and (2) a polycontextual lens for the cross-national comparison of users' security behaviors in the United States and China. The conceptualized model is tested based on 718 survey observations collected from the United States and China. The results support our model and show the divergence between the United States, an exemplar of modern Western society, and China, an exemplar of traditional Eastern society, in forming threat perceptions and in seeking help and avoidance as coping behaviors. Our results also uncovered the significant moderating impacts of espoused culture on the way perceptions of security threats and coping appraisals influence security behaviors. Our findings underline the importance of context-sensitive theory building in security research and provide insights into the motivators and moderators of individuals' online security behaviors in the two nations.
Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Phishing websites continue to successfully exploit user vulnerabilities in household and enterprise settings. Existing anti-phishing tools lack the accuracy and generalizability needed to protect Internet users and organizations from the myriad of attacks encountered daily. Consequently, users often disregard these tools' warnings. In this study, using a design science approach, we propose a novel method for detecting phishing websites. By adopting a genre theoretic perspective, the proposed genre tree kernel method utilizes fraud cues that are associated with differences in purpose between legitimate and phishing websites, manifested through genre composition and design structure, resulting in enhanced anti-phishing capabilities. To evaluate the genre tree kernel method, a series of experiments were conducted on a testbed encompassing thousands of legitimate and phishing websites. The results revealed that the proposed method provided significantly better detection capabilities than state-of-the-art anti-phishing methods. An additional experiment demonstrated the effectiveness of the genre tree kernel technique in user settings; users utilizing the method were able to better identify and avoid phishing websites, and were consequently less likely to transact with them. Given the extensive monetary and social ramifications associated with phishing, the results have important implications for future anti-phishing strategies. More broadly, the results underscore the importance of considering intention/purpose as a critical dimension for automated credibility assessment: focusing not only on the ÒwhatÓ but rather on operationalizing the ÒwhyÓ into salient detection cues. > >
Ontology-Based Evaluation of Natural Disaster Management Websites: A Multistakeholder Perspective (MIS Quarterly, 2014)
Authors: Abstract:
    In recent years, the world has witnessed a number of severe natural disasters, causing heavy losses to families, communities, and even nations. Natural disaster management (NDM) websites play an important role in assisting people through various disaster stages. However, such websites are complex and there is little research on standards and guidelines for their development and evaluation. In this paper, we develop an ontology-based evaluation tool to assess the utility of NDM websites. Two main groups of stakeholders— experts who are in charge of NDM websites and potential users of such websites—contributed to the process. A total of 73 experts validated the ontology developed for NDM web elements through a Delphi study. These experts also provided importance ratings for web elements in the ontology. In a survey of the second major group of stakeholders—potential users—818 participants provided another set of importance ratings for web elements in the ontology. The design theory in this work is based on utility theory. The metrics for the evaluation of websites are relative utility and absolute utility. Using the evaluation tool, we evaluated the NDM websites of the 50 U.S. states from the perspectives of the two groups of stakeholders. The results indicate a lack of readiness in most of these websites.
Cultural Signifers of Web Site Images. (Journal of Management Information Systems, 2011)
Authors: Abstract:
    Web sites rely on pictures and animation to convey subtle messages that are more effectively communicated nonverbally. We argue that such messages could have strong cultural content, which should be understood in developing Web sites. Hence, this paper explores the cultural content of Web site images and develops a theory for Web-image signifiers. This is done in two phases. Phase I has an interpretive qualitative approach that uses Grounded Theory to identify signifiers and to develop the Web-image signifiers (WIS) theory. Phase II quantitatively tests the WIS theory. Together, these two phases identify and validate signifiers of cultural dimensions in Web site images. More interestingly, the results uncover that cultural dimensions are signified in five categories, of which two, humans and buildings categories, are the most prominent. The contribution of this paper is in developing a comprehensive theory for the cultural content of Web images, identifying 48 signifiers in Web images, discovering new categories of signifiers, and providing insights into the nature of cultural signification by testing the theory. Such knowledge could heighten our sensitivity and awareness of hidden cultural messages in Web site images. The WIS theory could provide a novel approach to the cultural studies of Web images and other artifacts with cultural content. The results of this work have immediate application in the design of Web sites for a multicultural audience.
Dynamics of Trust Revision: Using Health Infomediaries. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    This study explores the process by which trust evolves over time. There have been a number of studies underscoring the importance of trust in the online environment. However, most trust studies have concentrated on the initial trust, and there is little known about how trust beliefs evolve over time. The dynamics of trust are of particular importance in the use of infomediaries (online information providers), among which health infomediaries are the most important for Web consumers in dealing with their wellness and health issues. We investigate the evolution of trust using the case of health infomediaries. The examination of the temporal changes in trust was carried out through two approaches--comparative statics and dynamic analyses. The research method was laboratory experiment and the data were collected for two episodes of encounters. Two comparative statics models and one dynamic model were estimated in order to examine the parameter changes from one episode of encounter to the next as well as the dynamics of belief changes. The results of analysis show that the structure of trust changes over time and information quality becomes the single most important antecedent in infomediary trust building in the later stages of use. Furthermore, our study also indicates that satisfaction plays an important role in changing Web customers' trust beliefs. Contributions as well as research and managerial implications are discussed.
Web Documents' Cultural Masculinity and Femininity. (Journal of Management Information Systems, 2006)
Authors: Abstract:
    As online information dissemination and e-commerce transactions become globally popular, understanding the cultural aspects of Web site documents will gain critical importance. Hidden cultural dimensions could facilitate or inhibit the usability and communication effectiveness of Web sites. However, few studies have investigated the existence of cultural dimensions in Web sites. This study identifies cultural signifiers of Web documents as they relate to the masculinity-femininity dimension. We adopt an interpretive approach for investigating, identifying, and categorizing masculinity-femininity signifiers. Comparing and contrasting Web sites aimed predominantly at either men or women, we use grounded theory for constant comparison and categorization of data. The interpretive analysis is carried out within a framework of hermeneutics. Drawing from the literature of signs (semiology), we identify the signifiers and myths for the masculinity and femininity of Web documents, and report on the possible presence of masculine and feminine androgyny. Following the dictum of grounded theory, we present support for our results from theories and findings in diverse fields of study. We then report on the contributions of our research in three ways. First, the knowledge of cultural signifiers raises managers' and researchers' awareness of cultural contents of Web documents, and may lead to improvement in the clarity and communication effectiveness of Web documents..Second, our work brings forth contrasts and contradictions inherent in masculine and feminine modes of Web document development, raising questions about cultural messages within Web documents that could distort communication and promote cultural values not shared by members of the targeted community. Third, we introduce the concept of androgyny as playing a possible role in reducing such distortions.
The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach. (Information Systems Research, 2002)
Authors: Abstract:
    Online shopping provides convenience to Web shoppers, yet its electronic format changes information-gathering methods traditionally used by customers. This change raises questions concerning customer satisfaction with the online purchasing process. Web shopping involves a number of phases, including the information phase, in which customers search for information regarding their intended purchases. The purpose of this paper is to develop theoretically justifiable constructs for measuring Web-customer satisfaction during the information phase. By synthesizing the expectation-disconfirmation paradigm with empirical theories in user satisfaction, we separate Web site quality into information quality (IQ) and system quality (SQ), and propose nine key constructs for Web-customer satisfaction. The measurements for these constructs are developed and tested in a two-phase study. In the first phase, the IQ and SQ dimensions are identified, and instruments for measuring them are developed and tested. In the second phase, using the salient dimensions of Web-IQ and Web-SQ as the basis for formulating first-order factors, we develop and empirically test instruments for measuring IQ-and SQ-satisfaction. Moreover, this phase involves the design and test of second-order factors for measuring Web-customer expectations, disconfirmation, and perceived performance regarding IQ and SQ. The analysis of the measurement model indicates that the proposed metrics have a relatively high degree of validity and reliability. The results of the study provide reliable instruments for operationalizing the key constructs in the analysis of Web-customer satisfaction within the expectation-disconfirmation paradigm.
Reliability of Information Systems Based on the Critical Success Factors--Formulation. (MIS Quarterly, 1987)
Authors: Abstract:
    This article develops reliability as a measure of information systems (IS) success based on the critical success factors (CSF). This paper constructs the hierarchical configuration of CSFs using Rockart's data on CSFs of IS executives, and checks the applicability of this configuration by using Martin's data. The article then derives IS reliability from the CSF configuration. Reliability is a quantifiable measure useful in the control and management of IS. It provides an early warning about the quality of the IS, and identifies the areas where the trouble lies. Reliability can be used to compare various information systems, and as the numerical example in this article demonstrates, this measure could be used extensively in cost/benefit analyses of competing IS investment projects.