Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

The “Mail-Order-Bride” (MOB) Phenomenon in the Cyberworld: An Interpretive Investigation

Published: 01 October 2013 Publication History
  • Get Citation Alerts
  • Abstract

    Information technology (IT) is often an enabler in bringing people together. In the context of this study, IT helps connect matchmaking service providers with those looking for love, particularly when a male seeks to meet and possibly marry a female from another country: a process which results in over 16,500 such ‘mail-order-bride’ (MOB) marriages a year in the United States alone. Past research in business disciplines has been largely silent about the way in which this process unfolds, the perspectives of the participants at different points of time, and the role of IT underlying the MOB matchmaking service. Adopting an interpretivist stance, and utilizing some of the methodological guidelines associated with the Grounded Theory Methodology (GTM), we develop a process model which highlights: a) the key states of the process through which the relationship between the MOB seeker (the man) and the MOB (the woman) unfolds, b) the transitions between states, and c) the triggering conditions for the transitions from one state to another. This study also highlights key motivations of the individuals participating in the MOB process, the effect of power and the role it plays in the dynamics of the relationships, the status of women and how their status evolves during the MOB process, and the unique affordance provided by IT as the relationships evolve.

    Supplementary Material

    PDF File (a10-sarker_appendix.pdf)
    The proof is given in an electronic appendix, available online in the ACM Digital Library.

    References

    [1]
    Alvesson, M. and Sköldberg, K. 2009. Reflexive Methodology: New Vistas for Qualitative Research. Sage, London.
    [2]
    Angeles, L. and Sunanta, S. 2007. Exotic love at your fingertips: Intermarriage Websites, gendered representation, and the transnational migration of Filipino and Thai women. Kasarinlan: Philippine J. Third World Studies 22, 1, 3--31.
    [3]
    Birks, D. F., Fernandez, W., Levina, N., and Nasirin, S. 2013. Grounded theory method in information systems research: Its nature, diversity and opportunities. Eur. J. Inf. Syst. 22, 1, 1--8.
    [4]
    Booth, T. L. 1967. Sequential Machines and Automata Theory. Wiley.
    [5]
    Bryant, A. and Charmaz, K. 2007. Grounded theory in historical perspective: An epistemological account. In Handbook of Grounded Theory, A. Bryant and K. Charmaz Eds., Sage, London, 1--57.
    [6]
    Burke, P. J. 1997. An identity model for network exchange. Amer. Sociological Review 62, 134--150.
    [7]
    Chakraborty, S., Sarker, S., and Sarker, S. 2010. An exploration into the process of requirements elicitation: A grounded approach. J. Assoc. Inf. Syst. 11, 4, 212--249.
    [8]
    Chalmers, M. 2004. Hermeneutics, information and representation. Euro. J. Inf. Syst. 13, 3, 210--220.
    [9]
    Charmaz, K. 2001 Grounded theory in the 21st century: Applications for advancing social justice studies. In The American Tradition in Qualitative Research, N. K. Denzin and Y. S. Lincoln Eds., Sage, London, 244--285.
    [10]
    Charmaz, K. 2006. Constructing Grounded Theory: A Practical Guide through Qualitative Analysis. Pine Forge Press.
    [11]
    Dennis, A. R. and Valacich, J. S. 1999. Rethinking media richness: Towards a theory of media synchronicity. In Proceedings of the 32nd Annual Hawaii International Conference on System Sciences. IEEE, 10.
    [12]
    Dennis, A. R., Fuller, R. M., and Valacich, J. S. 2008. Media, tasks, and communication processes: A theory of media synchronicity. MIS Quart. 32, 3, 575--600.
    [13]
    Derrick, D. C., Meservy, T. O., Jenkins, J. L., Burgoon, J. K., and Nunamaker Jr, J. F. 2013. Detecting deceptive chat-based communication using typing behavior and message cues. ACM Trans. Manage. Inf. Syst. 4, 2, 9.
    [14]
    Ellison, N., Heino, R., and Gibbs, J. 2006. Managing impressions online: Self-presentation processes in the online dating environment. J. Comput.-Mediated Commun. 11, 2, 415--441.
    [15]
    Fernback, J. 2007. Selling ourselves? Profitable surveillance and online communities. Crit. Discourse Stud. 4, 3, 311--330.
    [16]
    Fiore, A. T. and Donath, J. S. 2004. Online personals: An overview. In Extended Abstracts on Human Factors in Computing Systems (CHI’04). ACM, 1395--1398.
    [17]
    Fisher, D. 2002a. Indle King found guilty of killing mail-order bride. Seattle Post-Intelligencer.
    [18]
    Fisher, D. 2002b. King gets 28-year prison sentence for killing mail-order bride. Seattle Post-Intelligencer.
    [19]
    Frost, J. H., Chance, Z., Norton, M. I., and Ariely, D. 2008. People are experience goods: Improving online dating with virtual dates. J. Interact. Market. 22, 1, 51--61.
    [20]
    Gefen, D., Karahanna, E., and Straub, D. W. 2003. Trust and TAM in online shopping: An integrated model. MIS Quart. 27, 1, 51--90.
    [21]
    Glaser, B. and Strauss, A. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine Transaction.
    [22]
    Gregor, S. 2006. The nature of theory in information systems. MIS Quarterly 30, 3, 611--642.
    [23]
    Harris, C. 2005. Marriage brokers scrutinized. Arizona Republic.
    [24]
    Higgins, E. T. 1987 Self-discrepancy: A theory relating self and affect. Psych. Rev. 94, 3, 319.
    [25]
    Hughes, D. M. 2000. The Natasha trade: The transnational shadow market of trafficking in women. J. Int. Affairs-Columbia Univ. 53, 2, 625--652.
    [26]
    Kamb, L. and Jamieson, R. L. 2001. Mail-order bride’s dream of a better life ends in death. Seattle Post-Intelligencer.
    [27]
    Keen, P. G. W. and Cummings, J. M. 1993. Networks in Action: Business Concepts and Telecommunication Decisions. Course Technology Press.
    [28]
    Kelle, U. 2007. The development of categories: Different approaches in grounded theory. In The SAGE Handbook of Grounded Theory, A. Bryant and K. Charmaz Eds., Sage, London, 214.
    [29]
    Kim, J., Lee, J., Han, K., and Lee, M. 2002. Businesses as buildings: Metrics for the architectural quality of internet businesses. Inf. Syst. Research 13, 3, 239--254.
    [30]
    Kojima, Y. 2001. In the business of cultural reproduction: Theoretical implications of the mail-order bride phenomenon. In Women’s Studies International Forum, 199--210.
    [31]
    Laudon, K. C. and Traver, C. G. 2007. E-commerce. Pearson Prentice Hall.
    [32]
    Lehmann, H. 2001a. A grounded theory of international information systems. ResearchSpace@Auckland.
    [33]
    Lehmann, H. 2001b. Using grounded theory with technology cases: Distilling critical theory from a multinational information systems development project. J. Global Inf. Tech. Manage. 4, 1, 45--60.
    [34]
    Liu, C., Marchewkab, J. T., Luc, J., and Yu, C.-S. 2005. Beyond concern: A privacy-trust-behavioural intention model of e-commerce. Inf. Manage. 42, 289--304.
    [35]
    Markus, M. L. and Robey, D. 1988. Information technology and organizational change: Causal structure in theory and research. Manage. Sci. 34, 5, 583--598.
    [36]
    Markus, M. L. and Silver, M. S. 2008. A foundation for the study of IT effects: A new look at DeSanctis and Poole’s concepts of structural features and spirit. J. Assoc. Inf. Syst. 9, 10, 609--632.
    [37]
    Maznevski, M. L. and Chudoba, K. M. 2000. Bridging space over time: Global virtual team dynamics and effectiveness. Organiz. Sci. 11, 5, 473--492.
    [38]
    McKnight, D. H., Carter, M., Thatcher, J. B., and Clay, P. F. 2011. Trust in a specific technology: An investigation of its components and measures. ACM Trans. Manage. Inf. Syst. 2, 2, 12.
    [39]
    Palmer, J. W. 2002. Web site usability, design, and performance metrics. Inf. Syst. Research 13, 2, 151--167.
    [40]
    Patton, M. Q. 1990. Qualitative Evaluation and Research Methods. SAGE, London.
    [41]
    Pavlou, P. A. and Gefen, D. 2004. Building effective online marketplaces with institution-based trust. Inf. Syst. Research 15, 1, 37--59.
    [42]
    Pehar, J. 2003. e-brides: The mail-order bride industry. Canadian Woman Studies 22, 3.
    [43]
    Pennington, R., Wilcox, H. D., and Grover, V. 2003. The role of system trust in business-to-consumer transactions. J. Manage. Inf. Syst. 20, 3, 197--226.
    [44]
    Reichertz, J. 2007. Abduction: The logic of discovery of grounded theory. In The SAGE Handbook of Grounded Theory, A. Bryant and K. Charmaz Eds., Sage, London, 214.
    [45]
    Robinson, K. 1996. Of mail-order brides and boys’ own tales: Representations of Asian-Australian marriages. Feminist Rev. 53--68.
    [46]
    Sarker, S. and Sahay, S. 2003. Understanding virtual team development: An interpretive study. J. Assoc. Inf. Syst. 4, 1, 1--38.
    [47]
    Sarker, S. and Lee, A. S. 2006. Does the use of computer-based BPC tools contribute to redesign effectiveness? Insights from a hermeneutic study. IEEE Trans. Eng. Manage. 53, 1, 130--145.
    [48]
    Sarker, S., Lau, F., and Sahay, S. 2001. Using an adapted grounded theory approach for inductive theory building about virtual team development. Datab. Advances Inf. Syst. 32, 1, 38--56.
    [49]
    Sarker, S., Xiao, X., and Beaulieu, T. 2012. Toward an anatomy of successful qualitative research manuscripts. In Proceedings of the 33rd International Conference on Information Systems.
    [50]
    Schaeffer-Grabiel, F. 2006. Planet-Love.com: Cyberbrides in the Americas and the transnational routes of US masculinity. Signs 31, 2, 331--356.
    [51]
    Sciachitano, M. 2000. MOBS on the net: Critiquing the gaze of the cyber bride industry. In Race, Gender & Class, 57--69.
    [52]
    Strauss, A. and Corbin, J. 1990. Basics of Qualitative Research. Sage, London.
    [53]
    Suddaby, R. 2006. From the editors: What grounded theory is not. Acad. Manage. J. 49, 4, 633--642.
    [54]
    Thibaut, J. W. and Kelley, H. H. 1959. The Social Psychology of Groups. Wiley.
    [55]
    Thompson, V. and Lovett, E. 2011. Online international marriage broker promises men love and women escape, but it comes with risks. ABC News.
    [56]
    Tolentino, R. B. 1996. Bodies, letters, catalogs: Filipinas in transnational space. Social Text 48, 49--76.
    [57]
    Urquhart, C. 2007. The evolving nature of grounded theory method: The case of the information systems discipline. In The Sage Handbook of Grounded Theory, A. Bryant and K. Charmaz Eds., Sage, London, 339--359.
    [58]
    Urquhart, C. and Fernandez, W. 2006. Grounded theory method: The researcher as blank slate and other myths. In Proceedings of the 27th International Conference on Information Systems.
    [59]
    Van der Heijden, H. 2004. User acceptance of hedonic information systems. MIS Quart. 28, 4, 695--704.
    [60]
    Walsham, G. 1995. Interpretive case studies in IS research: Nature and method. Euro. J. Inf. Syst. 4, 2, 74--81.
    [61]
    Walsham, G. 2006. Doing interpretive research. Euro. J. Inf. Syst. 15, 3, 320--330.
    [62]
    Wayne, T. 2011. The mail-order-bride trade is flourishing. Business Week.

    Cited By

    View all
    • (2022)Medical use and costs for native fathers and children from transnational marriage families in Taiwan from 2004 to 2017Frontiers in Public Health10.3389/fpubh.2022.87085910Online publication date: 4-Oct-2022
    • (2021)Why do people use mobile payment technologies and why would they continue? An examination and implications from IndiaResearch Policy10.1016/j.respol.2021.10422850:6(104228)Online publication date: Jul-2021
    • (2019)Human TraffickingKidnapping and Violence10.1007/978-1-4939-2117-1_9(87-126)Online publication date: 5-Sep-2019

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Management Information Systems
    ACM Transactions on Management Information Systems  Volume 4, Issue 3
    October 2013
    113 pages
    ISSN:2158-656X
    EISSN:2158-6578
    DOI:10.1145/2523025
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 October 2013
    Accepted: 01 September 2013
    Revised: 01 August 2013
    Received: 01 August 2011
    Published in TMIS Volume 4, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. On-line relationships
    2. e-commerce
    3. grounded theory
    4. information technology
    5. interpretive research
    6. mail order brides (“MOB”)
    7. process model

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Medical use and costs for native fathers and children from transnational marriage families in Taiwan from 2004 to 2017Frontiers in Public Health10.3389/fpubh.2022.87085910Online publication date: 4-Oct-2022
    • (2021)Why do people use mobile payment technologies and why would they continue? An examination and implications from IndiaResearch Policy10.1016/j.respol.2021.10422850:6(104228)Online publication date: Jul-2021
    • (2019)Human TraffickingKidnapping and Violence10.1007/978-1-4939-2117-1_9(87-126)Online publication date: 5-Sep-2019

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media