Author List: Majchrzak, Ann; Jarvenpaa, Sirkka L.;
Journal of Management Information Systems, 2010, Volume 27, Issue 2, Page 55-86.
In many domains of increased turbulence and volatility, interorganizational ad hoc collaborations are common. One such domain is homeland security in which security professionals collaborate virtually with individuals outside of their own organizations in response to a security threat. In such a domain, a safe context is needed to ensure that interactions with collaborators not only help to solve the immediate threat but also avoid the improper use by outside parties of information released during these collaborations. We use the heuristic systematic model of information processing to hypothesize that the relationship between different safe context factors and a security professional's perceptions of collaboration success will be contingent on differences in geographic proximity of the collaborating parties--differences in proximity that are not related to differences in physical face-to-face contact but to differences in social proximity. Our exploratory empirical investigation finds support for the hypothesized interaction effect: safe contexts that require deeper processing are related to higher levels of perceived success when the parties are geographically proximal (with no differences in face-to-face contact), whereas safe contexts that involve heuristic-based processing are related to success when parties are geographically less proximal. Our findings suggest that the utility of safe context factors is contextualized based on the proximity of interacting parties, that geographical proximity's social space dimension plays a key role independent of differences in physical face-to-face contact, and that, practically, to be successful, ad hoc collaborators should have access to a range of safe context factors, using them in different combinations depending on the proximity of network members.
Keywords: dual process theories; geographic proximity; knowledge protection; personal networks; safe contexts; security professionals
Algorithm:

List of Topics

#258 0.404 information proximity message seeking perceived distance communication overload context geographic dispersed higher geographically task contexts recipient face-to-face temporal safe dyadic
#73 0.129 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate
#198 0.087 factors success information critical management implementation study factor successful systems support quality variables related results key model csf importance determinants
#9 0.078 using subjects results study experiment did conducted task time used experienced use preference experimental presented decision-making empirical significantly effects better
#224 0.062 complexity task environments e-business environment factors technology characteristics literature affect influence role important relationship model organizational contingent actual map dimension
#53 0.061 knowledge application management domain processes kms systems study different use domains role comprehension effective types draw scope furthermore level levels
#154 0.058 memory support organizations information organizational requirements different complex require development provides resources organization paper transactive depth process outside difficult breadth