It seems that everything—from our cars to the search engines we use—collects information about us and our activities. Breaches compromising personal information are an unfortunate by-product of our modern information- intensive society.... more
It seems that everything—from our cars to the search engines we use—collects information about us and our activities. Breaches compromising personal information are an unfortunate by-product of our modern information-
intensive society. In this paper, we examine previous research on this problem from diverse perspectives. We then develop an interdisciplinary framework that examines parties involved, benefits derived by each party, losses from a breach, and the ability of each party to mitigate losses. Within this framework, appropriate economic theories are
extended to other types of breaches and frauds.
In today’s increasingly competitive business world, organizations are using ICT to advance their business strategies and increase their competitive advantage. One technological element that is growing in popularity is knowledge discovery... more
In today’s increasingly competitive business world, organizations are using ICT to advance their business strategies and increase their competitive advantage. One technological element that is growing in popularity is knowledge discovery in databases (KDD). In this paper, we propose an analytic framework which is applied to two cases concerning KDD. The first case presents an organization at the analysis stage of a KDD project. The second one shows how a multinational company leverages its databases by mining data to discover new knowledge.
This article investigates two research questions concerning web shopping tools. The first asks how online decision aids can support a consumer’s non-cognitive decision processes. The second asks how these tools support non-cognitive... more
This article investigates two research questions concerning web shopping tools. The first asks how online decision aids can support a consumer’s non-cognitive decision processes. The second asks how these tools support non-cognitive online shopping for products of different categories. To answer these questions, the author conducted a thorough literature review in the fields of management information systems, e-commerce and consumer behaviour. The results show that e-shoppers may adopt several non-cognitive decision-making approaches. Not one tool is sufficient to support all of these, but web stores should offer a selection of decision aids to satisfy their customers’ needs. These tools need to be adapted as well to the categories of products offered in each web store.
Internet, par sa nature globale, apporte de nouvelles opportunités de recherche et d'affaires dans des contextes multiculturels. Or, une situation exolingue accroît le risque d’imprécision ou de confusion linguistiques. Les auteurs de cet... more
Internet, par sa nature globale, apporte de nouvelles opportunités de recherche et d'affaires dans des contextes multiculturels. Or, une situation exolingue accroît le risque d’imprécision ou de confusion linguistiques. Les auteurs de cet article présentent une synthèse des méthodes utilisées pour traduire et valider les textes. Ils proposent une approche pour traduire et valider des textes et des questionnaires de recherche tout en assurant la validité d'équivalence des versions linguistiques. La méthode proposée pourra être aussi utilisée dans un contexte d’affaires.
Information Systems (IS), as a scholarly discipline, has been characterized as very diversified and has evolved considerably over the years. The purpose of this study is to present an overview of the changes in IS research that occurred... more
Information Systems (IS), as a scholarly discipline, has been characterized as very diversified and has evolved considerably over the years. The purpose of this study is to present an overview of the changes in IS research that occurred between two periods 1984 to 1986 and 1996 to 1998, based on articles published in IS journals: MIS Quarterly and Information Systems Research. The articles were analyzed according to main topic, technological approach, research methods, keywords and contributing disciplines such as humanities and social sciences. Significant differences were found between the two periods. Cognitive maps of keyword-main topic associations are presented for each period. The various findings are discussed and linked to current trends. They show the beginnings of a promising tendency toward the development of an evolutionary and cumulative research tradition. The findings will provide food for thoughts for researchers of all disciplines.
This research examines the cognitive fit between the information presentation format and the information load of a product selection task in a context of e-shopping. The research model proposes that this fit influences the estimated... more
This research examines the cognitive fit between the information presentation format and the information load of a product selection task in a context of e-shopping. The research model proposes that this fit influences the estimated entropy, the perceived ease of use and the perceived cognitive effort. The two latter variables are antecedents of the satisfaction towards the selected product.Cette recherche propose un modele de ‘fit’ cognitif entre le format de presentation de l’information et la charge informationnelle de la tâche de selection d’un produit en contexte de cybermagasinage. Le modele propose que le ‘fit’ influence l’entropie estimee, la facilite d’utilisation percue et l’effort cognitif percu, et que ces deux dernieres variables sont des antecedents de la satisfaction envers la selection d’un produit.
Information Systems (IS), as a scholarly discipline, has been characterized as very diversified and has evolved considerably over the years. The purpose of this study is to present an overview of the changes in IS research that occurred... more
Information Systems (IS), as a scholarly discipline, has been characterized as very diversified and has evolved considerably over the years. The purpose of this study is to present an overview of the changes in IS research that occurred between two periods 1984 to 1986 and 1996 to 1998, based on articles published in IS journals: MIS Quarterly and Information Systems Research. The articles were analyzed according to main topic, technological approach, research methods, keywords and contributing disciplines such as humanities and social sciences. Significant differences were found between the two periods. Cognitive maps of keyword-main topic associations are presented for each period. The various findings are discussed and linked to current trends. They show the beginnings of a promising tendency toward the development of an evolutionary and cumulative research tradition. The findings will provide food for thoughts for researchers of all disciplines.
Cette recherche propose un modele de ‘fit’ cognitif entre le format de presentation de l’information et la charge informationnelle de la tâche de selection d’un produit en contexte de cybermagasinage. Le modele propose que le ‘fit’... more
Cette recherche propose un modele de ‘fit’ cognitif entre le format de presentation de l’information et la charge informationnelle de la tâche de selection d’un produit en contexte de cybermagasinage. Le modele propose que le ‘fit’ influence l’entropie estimee, la facilite d’utilisation percue et l’effort cognitif percu et que ces deux dernieres variables sont des antecedents a la satisfaction envers la selection effectuee. En contexte de cybermagasinage, la tâche de selection de produit est primordiale puisque la transaction d’achat ne s’effectuera que lorsque le consommateur aura trouve un produit satisfaisant. Les antecedents de la satisfaction envers la selection de produit n’ont pas encore ete etudies par les chercheurs en systemes d’information. Cette etude s’interesse a ces antecedents et examine l’impact du format de presentation de l’information au client d’un cybermagasin sur la satisfaction envers le choix de produit par le consommateur. Le modele propose ici s’appuie sur...
Purpose – This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches. Design/methodology/approach – A cross-sectional survey was used to source participants'... more
Purpose – This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches. Design/methodology/approach – A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada. Findings – The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct. Research limitations/implications – This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse. Practical implications –The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified. Originality/value – Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.