Many factors influence the adoption of cloud computing. Organizations must systematically evaluate these factors before deciding to adopt cloud-based solutions. To assess the determinants that influence the adoption of cloud computing, we develop a research model based on the innovation characteristics from the diffusion of innovation (DOI) theory and the technology-organization-environment (TOE) framework. Data collected from 369 firms in Portugal are used to test the related hypotheses. The study also investigates the determinants of cloud-computing adoption in the manufacturing and services sectors.
Social commerce, as a relatively new phenomenon, has attracted little research attention. This study aims to provide initial insights into the dynamics of customer participation in social commerce. Based on the stimulus–organism–response paradigm, this study develops a model to investigate the effects of technological features (perceived interactivity, perceived personalization and perceived sociability) of social commerce on customers’ virtual experiences (social support, social presence and flow) and subsequently their participation intention. The results indicate that social commerce intention is determined by social support, social presence and flow experiences. These experiences, in turn, are influenced by perceived interactivity, personalization and sociability features.
Social networking sites (SNS) have become a significant component of people's daily lives and have revolutionized the ways that business is conducted, from product development and marketing to operation and human resource management. However, there have been few systematic studies that ask why people use such systems. To try to determine why, we proposed a model based on uses and gratifications theory. Hypotheses were tested using PLS on data collected from 148 SNS users. We found that user utilitarian (rational and goal-oriented) gratifications of immediate access and coordination, hedonic (pleasure-oriented) gratifications of affection and leisure, and website social presence were positive predictors of SNS usage. While prior research focused on the hedonic use of SNS, we explored the predictive value of utilitarian factors in SNS. Based on these findings, we suggest a need to focus on the SNS functionalities to provide users with both utilitarian and hedonic gratifications, and suggest incorporating appropriate website features to help users evoke a sense of human contact in the SNS context.
Recently, there has been a dramatic proliferation in the number of blogs; however, little is published about what motivates people to participate in blog activities. Based on the theory of reasoned action, we developed a model involving technology acceptance, knowledge sharing and social influences. A survey of 212 blog participants found strong support for the model. The results indicated that ease of use and enjoyment, and knowledge sharing (altruism and reputation) were positively related to attitude toward blogging, and accounted for 78% of the variance. On the other hand, social factors (community identification) and attitude toward blogging significantly influenced a blog participant's intention to continue to use blogs. Together they explain 83% of the variance of intention to blog.
The Internet is a communication channel that allows individuals to share information and knowledge. However, it is not obvious why individuals share knowledge with strangers for no apparent benefit. What are the critical factors influencing such behavior? To attempt to understand this paradox, we combined the theories of social capital and individual motivation to investigate the factors influencing knowledge sharing behavior in a virtual community, applying a participant involvement concept to analyze the moderating effects of individual motivation on knowledge sharing behavior. By analyzing the results of a survey using a questionnaire, we found that altruism, identification, reciprocity, and shared language had a significant and positive effect on knowledge sharing. Reputation, social interaction, and trust had positive effects on the quality, but not the quantity, of shared knowledge. Participant involvement had a moderating effect on the relationship of altruism and the quantity of shared knowledge. Theoretical and managerial implications are discussed.
The aim of our study was to further develop an understanding of social capital in organizational-knowledge-sharing. We first developed a measurement tool and then a theoretical framework in which three social capital factors (social network, social trust, and shared goals) were combined with the theory of reasoned action; their relationships were then examined using confirmatory factoring analysis. We then surveyed of 190 managers from Hong Kong firms, we confirm that a social network and shared goals significantly contributed to a person's volition to share knowledge, and directly contributed to the perceived social pressure of the organization. The social trust has however showed no direct effect on the attitude and subjective norm of sharing knowledge.
Employees’ failure to comply with IS security procedures is a key concern for organizations today. A number of socio-cognitive theories have been used to explain this. However, prior studies have not examined the influence of past and automatic behavior on employee decisions to comply. This is an important omission because past behavior has been assumed to strongly affect decision-making. To address this gap, we integrated habit (a routinized form of past behavior) with Protection Motivation Theory (PMT), to explain compliance. An empirical test showed that habitual IS security compliance strongly reinforced the cognitive processes theorized by PMT, as well as employee intention for future compliance. We also found that nearly all components of PMT significantly impacted employee intention to comply with IS security policies. Together, these results highlighted the importance of addressing employees’ past and automatic behavior in order to improve compliance.
This study investigates the moderating effect of culture and the mediating effect of trust in a social network community on the relationship between social interactions and purchase intention. Trust transference theory, social interactions, and Hofstede's cultural dimensions are considered. The findings from the research support the moderating effect of culture and the mediating role of trust in a social network community on the relationship between social interactions (in terms of closeness and familiarity) and intention to purchase in social commerce environments. In addition, the mediating effect of trust in a social network community is conditional on culture. The findings also suggest that trust in a social network community may be attributed to the closeness and familiarity developed among its members resulting from social interactions. The results presented herein are in line with the trust transference theory. The empirical study results also suggest that social commerce market penetration in East Asia may have relatively fewer barriers to overcome and be more likely to succeed than in the Latin America region.
Social networking sites (SNS) have transformed how individuals interact, build and maintain social relationships. We proposed a research model on the determinants of user continuance using Bagozzi's framework of self-regulation as the theoretical foundation. Following the process of appraisal → emotional reactions → coping responses, we developed the model by leveraging findings from social presence and IS continuance research. Based on survey data from Facebook users, we found that appraisal factors (pleasure, awareness, connectedness, and system quality) were strong determinants of emotional reaction (user satisfaction and sense of belonging). User satisfaction and sense of belonging together positively influenced continuance intention.
The era of big data has begun such that organizations in all industries have been heavily investing in big data initiatives. We know from prior studies that investments alone do not generate competitive advantage; instead, firms need to create capabilities that rival firms find hard to match. Drawing on the resource-based theory of the firm and recent work in big data, this study (1) identifies various resources that in combination build a big data analytics (BDA) capability, (2) creates an instrument to measure BDA capability of the firm, and (3) tests the relationship between BDA capability and firm performance. Results empirically validate the proposed theoretical framework of this study and provide evidence that BDA capability leads to superior firm performance.
A statistical meta-analysis of the technology acceptance model (TAM) as applied in various fields was conducted using 88 published studies that provided sufficient data to be credible. The results show TAM to be a valid and robust model that has been widely used, but which potentially has wider applicability. A moderator analysis involving user types and usage types was performed to investigate conditions under which TAM may have different effects. The study confirmed the value of using students as surrogates for professionals in some TAM studies, and perhaps more generally. It also revealed the power of meta-analysis as a rigorous alternative to qualitative and narrative literature review methods.
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees’ adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees’ belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees’ attitude toward complying with information security policies, and social norms toward complying with these policies had a significant and positive effect on the employees’ intention to comply with information security policies. Intention to comply with information security policies also had a significant impact on actual compliance with these policies. High level managers must warn employees of the importance of information security and why it is necessary to carry out these policies. In addition, employees should be provided with security education and hands on training.
In this paper, we draw on an extended Uses and Gratifications Theory (UGT) to explore factors that affect members’ continued use intention toward Social Networking Sites (SNSs). We also theorize about the intricate relationships among a variety of UGT constructs. Further, we conduct this research in a global context by comparing SNS use in the United States and Taiwan. Empirical survey data are collected to validate the research model, and several intriguing findings are observed. Our research results indicate that four determinants, i.e., gratifications, perceived critical mass, subjective norms, and privacy concerns, influence SNS users’ continuance intention and that regional differences moderate the effects of both gratifications and privacy concerns on continuance intention. Our study makes noticeable contributions to the literature on UGT and SNSs. The findings reported also inform service providers in developing better strategies for member retention.
This study examines the role of the decision environment in how well business intelligence (BI) capabilities are leveraged to achieve BI success. We examine the decision environment in terms of the types of decisions made and the information processing needs of the organization. Our findings suggest that technological capabilities such as data quality, user access and the integration of BI with other systems are necessary for BI success, regardless of the decision environment. However, the decision environment does influence the relationship between BI success and capabilities, such as the extent to which BI supports flexibility and risk in decision making.
In this article we develop a typology of review types and provide a descriptive insight into the most common reviews found in top IS journals. Our assessment reveals that the number of IS reviews has increased over the years. The majority of the 139 reviews are theoretical in nature, followed by narrative reviews, meta-analyses, descriptive reviews, hybrid reviews, critical reviews, and scoping reviews. Considering the calls for IS research to develop a cumulative tradition, we hope more review articles will be published in the future and encourage researchers who start a review to use our typology to position their contribution.
How does an entrepreneur's social network impact crowdfunding? Based on social capital theory, we developed a research model and conducted a comparative study using objective data collected from China and the U.S. We found that an entrepreneur's social network ties, obligations to fund other entrepreneurs, and the shared meaning of the crowdfunding project between the entrepreneur and the sponsors had significant effects on crowdfunding performance in both China and the U.S. The predictive power of the three dimensions of social capital was stronger in China than it was in the U.S. Obligation also had a greater impact in China.
Despite a plethora of studies that demonstrate the positive impacts of information technology (IT) capabilities on innovation performance, our knowledge of the processes through which such gains are achieved and their susceptibility to environmental factors remains limited. This paper fills these gaps by examining the roles of corporate entrepreneurship (CE) and competitive intensity at the firm level, thereby contributing to research on IT business value. Using data from manufacturing firms in China, we find that CE fully mediates the effect of IT capabilities on product innovation performance and that competitive intensity moderates the proposed relationships.
Despite the potential benefits that online banking offers consumers, it has low adoption rate. We systematically review online banking adoption literature to propose two research models of factors affecting pre-adoption and post-adoption of the online banking. To test our proposed models, we applied a two-stage random-effects meta-analytic structural equation modeling method to data collected from 25,265 cases from primary empirical studies of online banking adoption. Our findings show that ten factors affect consumers’ adoption of the online banking. Furthermore, we show that the relative importance of these factors differs depending on consumers’ pre-adoption and post-adoption of the online banking.
Many Internet-based services have already been ported to the mobile-based environment, embracing the new services is therefore critical to deriving revenue for services providers. Based on a valence framework and trust transfer theory, we developed a trust-based customer decision-making model of the non-independent, third-party mobile payment services context. We empirically investigated whether a customer's established trust in Internet payment services is likely to influence his or her initial trust in mobile payment services. We also examined how these trust beliefs might interact with both positive and negative valence factors and affect a customer's adoption of mobile payment services. Our SEM analysis indicated that trust indeed had a substantial impact on the cross-environment relationship and, further, that trust in combination with the positive and negative valence determinants directly and indirectly influenced behavioral intention. In addition, the magnitudes of these effects on workers and students were significantly different from each other.