The market for mobile apps is expanding quickly. Customer value for these apps is determined not ... more The market for mobile apps is expanding quickly. Customer value for these apps is determined not only positively by apputility, but also negatively by the perceived privacy risk which associated with disclosing sensitive private information suchas customer identity and geographical location. Currently, the most common app price is one to two dollars—similar to thatof a single song from an album on Apple iTunes. Because of the social nature of many of these apps, and the characteristicsof the primary user base (those ages 18-29), we ...
Proceedings of the Conference on Information Systems Applied Research ISSN, 2012
The use of mobile devices, and the applications that run on them, has soared in recent years. Amo... more The use of mobile devices, and the applications that run on them, has soared in recent years. Among the reasons for this rapid uptake is the inclusion of many useful sensors (including GPS, accelerometers, and cameras), the plethora of mobile apps, and improved battery life. These same advances in the capabilities of mobile devices and applications can also lead to privacy concerns; particularly those related to location privacy. We developed Find-a-mine, an iPhone application (and supporting infrastructure) to ...
Real time collaboration solutions are critical during a large scale emergency situation and neces... more Real time collaboration solutions are critical during a large scale emergency situation and necessitate the coordination of multiple disparate groups. Collaborative technologies may be valuable in the planning and execution of disaster preparedness and response. Yet, research suggests that specific collaborative technologies, such as group decision support systems, are not often leveraged for decision-making during real time emergency situations in the United States. In this chapter, we propose a theoretical model of the impact of disaster immediacy and collaboration systems on group processes and outcomes. Using a 3D model of the dimensions of space, time, and situation, we explore media richness and group polarization within the context of collaboration technologies and disaster situations. We also present the next generation of collaboration technology extensions in order to address the need for more contemporary decisional settings. This set of principles and theories suggest ho...
The real value of mobile applications is heavily dependent on consumers' trust in the privacy... more The real value of mobile applications is heavily dependent on consumers' trust in the privacy of their personal information and location data. However, research has generated few results based on actual information disclosure and even less that is based on longitudinal behavior. The purpose of this study is to execute a unique and authentic field experiment involving real risks and consumer behaviors regarding information disclosure over mobile devices. We compare two theoretical explanations of disclosure decisions: privacy calculus and prospect theory. Our results indicate that consumers are best modeled as "bounded" rational actors concerning their disclosure behavior. Also, actual information disclosure behavior over mobile applications is a more multifaceted issue than research has treated it thus far. For practice, mobile application providers should be aware that increasing the benefits of information disclosure via the app may have the counterintuitive effect o...
Proceedings of the Conference on Information Systems Applied Research ISSN, 2012
The use of mobile devices, and the applications that run on them, has soared in recent years. Amo... more The use of mobile devices, and the applications that run on them, has soared in recent years. Among the reasons for this rapid uptake is the inclusion of many useful sensors (including GPS, accelerometers, and cameras), the plethora of mobile apps, and improved battery life. These same advances in the capabilities of mobile devices and applications can also lead to privacy concerns; particularly those related to location privacy. We developed Find-a-mine, an iPhone application (and supporting infrastructure) to ...
Research on the agile and adaptive enterprise promotes real time dashboards as a powerful tool to... more Research on the agile and adaptive enterprise promotes real time dashboards as a powerful tool to provide coordination and control. Recent trends in market volatility have led firms to restructure around what organizational theorists term an “adhocracy”. Service oriented architecture represents an emerging architectural mechanism to align an organization's processes with the flexible structure of such an organizational form. A theory of dashboard creation and implementation that addresses the organizational ...
Smartphones are increasingly penetrating business and consumer markets, and mobile applications (... more Smartphones are increasingly penetrating business and consumer markets, and mobile applications (apps) have engendered a large and innovative market. Whereas apps are useful, they also present new forms of privacy risk associated with users’ personal and location data. However, these dangers do not appear to increase the perceived risk or reduce the trust consumers demonstrate when using apps. Many information technology (IT) trust indicators are well documented, such as the quality of the IT, trust assurances, brand recognition and social influences. However, these traditional indicators appear to have a lesser impact on the adoption of mobile commerce via apps because of the nature of mobile-app adoption and subsequent information disclosure. As a result, we draw from social cognitive theory and its construct of self-efficacy in particular to explain perceived mobile-app risk and provider trust. Through two controlled experiments, we demonstrate the strong direct effect of mobile-computing self-efficacy on users’ initial trust in location-based app vendors as well as their perceived risk of disclosing information – regardless of the actual trustworthiness of the app vendor. The results imply that being skilled in the latest smartphones and apps can cause users to place greater trust in app providers and perceive less risk in the app itself, even when the intentions of the app providers cannot be verified.
The market for mobile apps is expanding quickly. Customer value for these apps is determined not ... more The market for mobile apps is expanding quickly. Customer value for these apps is determined not only positively by apputility, but also negatively by the perceived privacy risk which associated with disclosing sensitive private information suchas customer identity and geographical location. Currently, the most common app price is one to two dollars—similar to thatof a single song from an album on Apple iTunes. Because of the social nature of many of these apps, and the characteristicsof the primary user base (those ages 18-29), we ...
Proceedings of the Conference on Information Systems Applied Research ISSN, 2012
The use of mobile devices, and the applications that run on them, has soared in recent years. Amo... more The use of mobile devices, and the applications that run on them, has soared in recent years. Among the reasons for this rapid uptake is the inclusion of many useful sensors (including GPS, accelerometers, and cameras), the plethora of mobile apps, and improved battery life. These same advances in the capabilities of mobile devices and applications can also lead to privacy concerns; particularly those related to location privacy. We developed Find-a-mine, an iPhone application (and supporting infrastructure) to ...
Real time collaboration solutions are critical during a large scale emergency situation and neces... more Real time collaboration solutions are critical during a large scale emergency situation and necessitate the coordination of multiple disparate groups. Collaborative technologies may be valuable in the planning and execution of disaster preparedness and response. Yet, research suggests that specific collaborative technologies, such as group decision support systems, are not often leveraged for decision-making during real time emergency situations in the United States. In this chapter, we propose a theoretical model of the impact of disaster immediacy and collaboration systems on group processes and outcomes. Using a 3D model of the dimensions of space, time, and situation, we explore media richness and group polarization within the context of collaboration technologies and disaster situations. We also present the next generation of collaboration technology extensions in order to address the need for more contemporary decisional settings. This set of principles and theories suggest ho...
The real value of mobile applications is heavily dependent on consumers' trust in the privacy... more The real value of mobile applications is heavily dependent on consumers' trust in the privacy of their personal information and location data. However, research has generated few results based on actual information disclosure and even less that is based on longitudinal behavior. The purpose of this study is to execute a unique and authentic field experiment involving real risks and consumer behaviors regarding information disclosure over mobile devices. We compare two theoretical explanations of disclosure decisions: privacy calculus and prospect theory. Our results indicate that consumers are best modeled as "bounded" rational actors concerning their disclosure behavior. Also, actual information disclosure behavior over mobile applications is a more multifaceted issue than research has treated it thus far. For practice, mobile application providers should be aware that increasing the benefits of information disclosure via the app may have the counterintuitive effect o...
Proceedings of the Conference on Information Systems Applied Research ISSN, 2012
The use of mobile devices, and the applications that run on them, has soared in recent years. Amo... more The use of mobile devices, and the applications that run on them, has soared in recent years. Among the reasons for this rapid uptake is the inclusion of many useful sensors (including GPS, accelerometers, and cameras), the plethora of mobile apps, and improved battery life. These same advances in the capabilities of mobile devices and applications can also lead to privacy concerns; particularly those related to location privacy. We developed Find-a-mine, an iPhone application (and supporting infrastructure) to ...
Research on the agile and adaptive enterprise promotes real time dashboards as a powerful tool to... more Research on the agile and adaptive enterprise promotes real time dashboards as a powerful tool to provide coordination and control. Recent trends in market volatility have led firms to restructure around what organizational theorists term an “adhocracy”. Service oriented architecture represents an emerging architectural mechanism to align an organization's processes with the flexible structure of such an organizational form. A theory of dashboard creation and implementation that addresses the organizational ...
Smartphones are increasingly penetrating business and consumer markets, and mobile applications (... more Smartphones are increasingly penetrating business and consumer markets, and mobile applications (apps) have engendered a large and innovative market. Whereas apps are useful, they also present new forms of privacy risk associated with users’ personal and location data. However, these dangers do not appear to increase the perceived risk or reduce the trust consumers demonstrate when using apps. Many information technology (IT) trust indicators are well documented, such as the quality of the IT, trust assurances, brand recognition and social influences. However, these traditional indicators appear to have a lesser impact on the adoption of mobile commerce via apps because of the nature of mobile-app adoption and subsequent information disclosure. As a result, we draw from social cognitive theory and its construct of self-efficacy in particular to explain perceived mobile-app risk and provider trust. Through two controlled experiments, we demonstrate the strong direct effect of mobile-computing self-efficacy on users’ initial trust in location-based app vendors as well as their perceived risk of disclosing information – regardless of the actual trustworthiness of the app vendor. The results imply that being skilled in the latest smartphones and apps can cause users to place greater trust in app providers and perceive less risk in the app itself, even when the intentions of the app providers cannot be verified.
Communications of the Association for Information Systems, Jan 1, 2011
A continual debate surrounds the effectiveness of agile software development practices. Some orga... more A continual debate surrounds the effectiveness of agile software development practices. Some organizations adopt agile practices to become more competitive, improve processes, and reduce costs. Other organizations are skeptical about whether agile development is beneficial. Large organizations face an additional challenge in integrating agile practices with existing standards and business processes. To examine the effects of agile development practices in large organizations, we review and integrate scientific literature and theory on agile software development. We further organize our theory and observations into a framework with guidelines for large organizations considering agile methodologies. Based on this framework, we present recommendations that suggest ways large organizations with established processes can successfully implement agile practices. Our analysis of the literature and theory provides new insight for researchers of agile software development and assists practitioners in determining how to adopt agile development in their organizations
When online social networks change privacy control features (i.e. methods of sharing consumer inf... more When online social networks change privacy control features (i.e. methods of sharing consumer information), the result is often media attention and public outcry. Facebook introduced new privacy controls in 2009 causing the Electronic Frontier Foundation to accuse them of pushing users to disclose more information than ever before. However, there is little research to indicate that such practices are effective. Although research on privacy control designs is emerging, few studies adopt theoretical bases or empirically test the results of the design. This study fills a theoretical and methodological gap in the context of privacy controls. We adopt feature fatigue theory from the marketing literature to explain the effects of privacy control complexity on consumer self-disclosure behavior. We test our model with a unique longitudinal field experiment wherein participants are randomly assigned to various treatments of privacy control complexity. We found support for our theoretical extension we term "privacy fatigue."
Uploads