Research Interests:
The current study aims to improve the requirements engineering RE communication, as often times projects fail due to poorly specified or misunderstood requirements. We use design science methods to build and evaluate a conceptual model... more
The current study aims to improve the requirements engineering RE communication, as often times projects fail due to poorly specified or misunderstood requirements. We use design science methods to build and evaluate a conceptual model which can add value to managers by offering them a set of guidelines and best practices for facilitating the RE communication. We did a qualitative study to investigate what the criteria are for selecting communication artifacts and we discovered that organizational culture plays a key role in this process. We demonstrate that the used artifacts need to adequately reflect the dynamic and intensity of the communication. Finally, we extend the RE process by adding two transitional phases to avoid requirements slipping through the gaps. Our findings indicate that such transitions are more distinct in traditional waterfall organizations and less salient in agile companies. The current study approaches the RE communication process from a design science perspective which adds more knowledge on the topic and addresses some existing issues leading to project failure.
Research Interests:
As competition increases in the online world, website owners will investigate ways in which they can attract more users. Additionally, many consumers suffer ever-increasing time limitations when browsing for a particular item on a... more
As competition increases in the online world, website owners will investigate ways in which they can attract more users. Additionally, many consumers suffer ever-increasing time limitations when browsing for a particular item on a website. Users can become frustrated and stressed when they are unable to find those items due to poor information scent, or semantic cues that are meant to lead to their goal. This paper presents and tests a theoretical model to predict how information scent can reduce the amount of stress that consumers experience when seeking information under time constraints. The study also demonstrates the relationships between information scent, time constraints, stress, performance and attitudes toward the website. Results indicate that while high information scent is an important design goal, scent can only be assessed by taking the user’s task into account
Research Interests:
We discuss research on GENI, a program of multiple cyberinfrastructure (CI) projects. Drawing on the concept of technological frames we discuss how the projects’ stakeholders perceived and presented the competing technologies that were... more
We discuss research on GENI, a program of multiple cyberinfrastructure (CI) projects. Drawing on the concept of technological frames we discuss how the projects’ stakeholders perceived and presented the competing technologies that were part of GENI and how they attempted to influence GENI’s development.
Research Interests:
Research Interests:
Abstract This work investigates the independent and joint influences of suggestive guidance and credibility indicators in a repeated choice environment laden with risk and uncertainty. Consistent with expectations, results from two... more
Abstract This work investigates the independent and joint influences of suggestive guidance and credibility indicators in a repeated choice environment laden with risk and uncertainty. Consistent with expectations, results from two studies reveal that aggressive and conservative suggestive guidance influence participant decision making. Credibility indicators partially moderate these relationships such that low credibility indicators lead to increased risk taking when suggestive guidance is conservative and decreased risk taking when suggestive guidance is aggressive. Post hoc analyses designed to examine differences in results across the two studies reveal unexpected differences in risk trends across participant type. Together, these findings contribute to the decision support system (DSS) literature by illustrating how credibility indicators can push users toward or away from either beneficial or detrimental suggestive guidance, and further, by challenging the commonly held assumption that inexperienced and experienced decision makers accept similar levels of risk in DSS settings where risk and uncertainty prevail.
Research Interests:
Research Interests:
Research Interests: Information Systems, Psychology, Computer Science, Information Security, Behavior, and 12 moreComputer Security, Applied Economics, Business and Management, Coping, Intentions, Threat, Fear Appeals, Internet privacy, Personally Identifiable Information, Protection Motivation Theory, Fear Appeal, and model comparison
Research Interests:
A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research... more
A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unab...
Research Interests:
This paper aims to contribute to the concept of ethical CIO leadership through a distinctive focus on virtue ethics. Our research investigates the theoretical significance of CIO virtues on two CIO capabilities and their corresponding... more
This paper aims to contribute to the concept of ethical CIO leadership through a distinctive focus on virtue ethics. Our research investigates the theoretical significance of CIO virtues on two CIO capabilities and their corresponding influence on the CIO's role effectiveness in organizations.
Research Interests:
Research Interests:
Research Interests:
This research investigates the independent and joint influences of suggestive guidance and credibility indicators in a repeated choice environment laden with risk and uncertainty. Consistent with expectations, results from two studies... more
This research investigates the independent and joint influences of suggestive guidance and credibility indicators in a repeated choice environment laden with risk and uncertainty. Consistent with expectations, results from two studies reveal that aggressive and conservative suggestive guidance influence participant decision-making. Credibility indicators partially moderate these relationships such that low credibility indicators lead to increased risk taking when suggestive guidance is conservative and decreased risk taking when suggestive guidance is aggressive. Post-hoc analyses designed to examine differences in results across the two studies reveal unexpected differences in risk trends across participant type. Together, these findings contribute to the decision support system (DSS) literature by illustrating how credibility indicators can push users towards or away from either beneficial or detrimental suggestive guidance, and further, by challenging the commonly held assumption...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ABSTRACT Trust and distrust are both considered to be crucial in online truster-trustee relationships. Although some research has proposed that trust and distrust are distinct, other research continues to hold that they are merely... more
ABSTRACT Trust and distrust are both considered to be crucial in online truster-trustee relationships. Although some research has proposed that trust and distrust are distinct, other research continues to hold that they are merely opposite ends of the same continuum. Given this debate, it is important to consider how distrust is distinguished from trust. To that end, this paper extends the nomological network of distrust and introduces two novel antecedents never introduced in online behavior literature: situational abnormalities and suspicion. For this nomological network, we also propose that trust and distrust coexist in online e-commerce relationships and can result in ambivalence when they both have high attitudinal values (represented in emotions, beliefs, or behaviors). Using an empirical study of online consumer behavior with 521 experienced online consumers, we found strong empirical validation for our newly proposed model. We provide evidence that suspicion and situational abnormalities are separate, important antecedents to distrust. We also examine the effect of ambivalence on the truster’s intentions toward the website and find a small positive effect that increases the user’s intentions toward the website. Finally, we empirically demonstrate the coexistence of trust and distrust as separate constructs and emphasize that distrust has a much larger impact on the truster’s intentions than does trust. We conclude with implications for theory and practice, along with a discussion of the limitations of and future opportunities revealed by this study.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ABSTRACT Research on the behavioral-based security of information systems within organizations and for personal use has been common over the last decade, however little is known regarding how individuals perceive the security of their... more
ABSTRACT Research on the behavioral-based security of information systems within organizations and for personal use has been common over the last decade, however little is known regarding how individuals perceive the security of their mobile devices. This study seeks to explore how the security notifications within a mobile application environment alter adoption and security-related beliefs concerning their device. We propose a theoretical model based on the technology adoption and psychological theories, and propose an experiment to test the model. Contributions and implications of the work are then proposed.
Research Interests:
Research Interests:
ABSTRACT Previous research has revealed that mere exposure to a website can positively influence a user’s experience with that website. This research extends this line of investigation by looking into the influence of familiarity on ads... more
ABSTRACT Previous research has revealed that mere exposure to a website can positively influence a user’s experience with that website. This research extends this line of investigation by looking into the influence of familiarity on ads that appear on a website as well as the website itself. The results revealed familiarity to have a significant impact on ad evaluation directly and website quality indi-rectly (through ad entertainment and informativeness)
Research Interests: Experiment and Internet
ABSTRACT This paper proposes the Unified Trust-Distrust Model (UTDM) to reconcile the differences in the literature on the complex relationship between trust and distrust. Extant research on trust and distrust follows two main approaches... more
ABSTRACT This paper proposes the Unified Trust-Distrust Model (UTDM) to reconcile the differences in the literature on the complex relationship between trust and distrust. Extant research on trust and distrust follows two main approaches that are built on contradictory assumptions: trust has been conceptualized as a different construct than distrust by some researchers, while others consider trust and distrust to represent opposite ends of a single continuum. UTDM expands upon both of these approaches while resolving their contradictions; thus, UTDM provides a novel view of the trust-distrust relationship that has the potential for more explanatory power than previous models. Further, UTDM introduces ambivalence to the trust-distrust literature as a possible consequence of contradictory trust and distrust attitudes, and as an antecedent of trusting intentions. Ambivalence was shown in previous research to attenuate the relationship between trusting beliefs and trusting intentions. UTDM further expands the trust-distrust literature by expanding the nomological network of distrust by proposing two new antecedents of distrust: suspicion and situational abnormality. The measurement of this model is then discussed along with future research possibilities that naturally result from this model.