Individual Theories

Ace your homework & exams now with Quizwiz!

Cognitive Science Article

Abbott 2004 Methods of Discovery: Heuristics for the Social Sciences Thagard, P. (2010). Cognitive Science. In Stanford Encyclopedia of Philosophy (pp. 1-11). Simon 1969 Science of the artifical.

Theme of Peer Production and Open Source

"Why would thousands of top-notch software developers contribute for free to the creation of a public good?"

Accountability Theory

"how the perceived need to justify one's behaviors to another party causes one to consider and feel accountable for the process by which decisions and judgments have been reached. (Vance et al. 2015)

Definition of Trust

"the belief that another person with whom you might interact will not cause you harm even though he or she is in the position to do so" Granovetter 2017

Affordances definition

"what it offers the animal, what it provides or furnishes, either for good or ill." This is a term that Gibson "made up" that specifically challenges the conventional psychological position of the day, that objects are composed of their qualities. Gibson posits that there are two reference points for affordance: the object and the observer. (Gibson 1979) Information can enlighten an object to allow the observer to further perceive affordance, while misinformation can lead to misperceptions about the affordances of the object. Lastly, Gibson discusses that affordance is "derived from the concepts of valence, invitation, and demand." However, these do not change with the needs of an observer. The affordance of an object remains constant as the observer adjusts its perception

Directions of Implementtion Studies

(1) Start from the beginning; Return back to TRA and TPB. (2) Identify a broader perspective on how users actually use the system (learning, adaptation, re-invention). (3) Use longitudinal multi-stage models to identify salient beliefs at different stages of implementation. (4) Focus on antecedents of beliefs and moderators that impact IT design on adoption. (5) Researchers need to move beyond perception. Identify objectively useful IT artifacts Benbasat and Barki 2007

Schutlze 2012 Performing embodied identity in virtual worlds

(1) Users rely on both representational and performative when creating their identity (2) user's replicate some of their actual bodily features and appearances in order to make their avatar reflect reality, in a way that promotes seriousness, rationality, and morality. (3) Users perform basic daily habits that create a "cyborgain subject" in which they experience themselves and the virtual world simultaneously.

Majchrzak et al. 2013 four affordances of social media use in organizations

- Metavoicing- engaging in the ongoing online knowledge conversation by reacting online to others' presence, profiles, content and activities -Triggered attending - engaging in the online knowledge conversation by remaining uninvolved in content production or the conversation until a timely automated alert informs the individual of a change to the specific content of interest. -Network informed associating - engaging in the online knowledge conversation informed by relational and content ties. -Generative role-taking - engaging in the online knowledge conversation by enacting patterned actions and taking on community-sustaining roles in order to maintain a productive dialogue among participants.

Four Principles of symbolic interactionism

-Interactive Determinism - understanding that "neither individual nor society nor self or other is ontologically prior but exist only in relation to each other; thus one can fully understand them only through their interaction, whether actual, virtual or imagined." -Symbolization - the processes through which meaning is identified and prescribed to people, events, or objects. -Emergence - Associated changes within organizations, social-life, meanings, and feelings. i.e., societal changes -Human Agency - People are viewed as active, willful human actors that are neither robotic nor passive social actors. (snow 2001)

Four Antecedents of Trust

1. Calculative Based- Trust can be shaped by rational assessments of the costs and benefits of another party cheating or cooperating in the relationship. 2. Institution Based Structural Assurance - or structural safeguards refer to an assessment of success due to safety nets such as legal recourse, guarantees, and regulations that exist in a specific context 3. Institution Based Situational Normality - an assessment that the transaction will be a success, based on how normal or customary the situation appears to be 4. Knowledge-based familiarity - familiarity reduces social uncertainty through increased understanding of what is happening in the present; familiarity builds trust because it creates an appropriate context to interpret the trusted party's behavior. Gefen et al. 2003

Sources of Trust

1. Trust based on knowledge or calculation of interests of the other (rational choice account) 2. Trust based on personal relationships (driven by emotions) 3. Trust based on membership in groups and networks 4. Institutional sources of trust 5. Trust based on norms Granovetter 2017

Four types of trust research

1. Trust between people or between groups 2. Trust between people and organizations 3. Trust between organizations 4. Trust between people and technology. Sollner et al. 2016

Four points of debate for affordances in ecological contexts

1. do affordances exist independent of perception or do they depend on perception? 2. affordance: action-related or more general? 3. does the existence of affordances depends on animals' effectivities? 4. affordances as privileged level or applying to all aspects of actions? Michaels 2003

Acceptance vs. Resistance

Acceptance is measure in frequency or intensity to use. Resistance, on the other hand, can result in many outcomes such as apathy, workarounds, and different types of resistance. Hirscheim & Newman (1988) Adverse reaction to a proposed chance which many manifest itself in overt actions.

4 Security Topics in MISQ

1. Behavioral Compliance 2. Risk Management 3. Investments in securing digital assets 4. Market effects of securing digital assets Hui et al. 2016

Antecedents of Habit

1. Frequent repetition 2. Satisfaction with outcomes 3. Relatively stable contexts 4. Comprehensiveness of usage (IS related) Limayem et al. 2007

Two types of trust

Cognitive Trust is a function of what users are willing to take factual information or advice and act on it. Emotional trust relates to the feelings one has when interacting with AI Glickson and Woolley 2020

Authors- Security and Privacy

Hui et al. 2016 - MISQ curation securing digital assets Straub et al. 1998 - techniques and actions to reduce security threats (Security Action Cycle) Liang and Xue 2009 - technology threat avoidance theory (TTAT) Willison and Wakentin 2013 - Address oversight of malicious insider attacks Vance et al. 2015 - examine prevention/deterrence of user's intentions to violate security policies by developing four UI artifacts.

Types of Resistance

Sabotaging new systems, Non-use, and Politics & power Lapointe and Rivard 2005

Economic Theory of Discriminiation

actual discrimination by firms or workers is measured by how much profits or wages they forfeit to avoid hiring or working with members of a group that is disliked. Becker 1993

three core principles of Blumer's theory

"(1) that people act toward things, including each other, on the basis of the meanings they have for them; (2) that these meanings are derived through social interaction with others; and (3) that these meanings are managed and transformed through an interpretive process (Snow 2001)

Two dimensions of trust

Competence- facet of trust that captured the authority skills, knowledge, and expertise needed to enhance students' learning and well-being Benevolence - assurance that the other will not exploit someone's vulnerability or take excessive advantage of someone, even when the opportunity is available high degrees of ability, benevolence and integrity indicate high trustworthiness.(Mayer et al. 1995)

Main goal of science

Explanation (Abbott 2004)

Limayem et al. 2007 Findings

Habit acts as a moderating variable of the relationship between intentions and IS continuance behavior Identified antecedents of habit: satisfaction, frequency of prior behavior, stability of context, and usage comprehensiveness.

General Deterrence Theory

It posits that individuals with an instrumental intent to commit antisocial acts can be dissuaded by the administration of strong disincentives and sanctions relevant to these acts." Straub et al. 1998

Technostress Inhibitors

Literacy Facilitation, technical support provision, involvement facilitation, job satisfaction, Organizational Commitment, Continuance Commitment,

Three Types of Thinking

Perception - reference-dependent: perceived attributes of a focal stimulus reflect the contrast between that stimulus and context of prior and concurrent stimuli. Intuition (system 1) - fast, automatic, effortless, associative, and often emotional charged, governed by habit, and difficult to control or modify Reasoning (System 2) - - slow, serial, effortful, and deliberately controlled; relatively flexible and potentially rule-governed (Kahneman 2003)

Systems Security Risk

Risk that the firm's information and/or information systems are not sufficiently protected against certain kinds of damage or loss."

Hong et al. 2018

Role of social media in crowdsourcing Data - fundraising data from kickstarter panel data - campaign and time-fixed effects embeddedness fosters trust because of the presence of greater social image concerns

von Hippel and von Krogh 2003

The authors posit that it is the combination of these two models that provides the most value. Furthermore, the authors present multiple areas of research with questions. (1) what is the nature of social integration in the private-collective innovation model, and how important is this for users' involvement with a particular project? (2) what is the importance of leadership for sustaining activity in distributed innovation, how do leaders emerge, and what are the various functions they perform?

Individual Characterisitcs

Presentation - Serrano & Karahanna (2016) Elicitation - Serrano & Karahanna (2016)

Systems Risk

Risks related to computer-based systems. "Systems losses and failures are broadly construed to mean modification, destruction, theft, or lack of availability of computer assets such as hard- ware, software, data, and services. It would, thus, include computer abuse, disaster scenarios, violations of intellectual property resident in computer systems, etc."

Memory

Can be natural or artificial Simon 1969

Authors - Behavioral Economics

Colin and Georgia 2004 - Loss aversion Kahneman and Traversky 1979 - Prospect Theory Becker 1993 - Rational Agents and maximize utility as they see it Kahneman 2003 - Bounded Rationality Hong et al. 2018 - Rational agent theory for why people donate to crowd sourcing campaigns - embeddedness Lui and Goodhue 2012 - Cognitive Miser theory , Tipping point based on trust, aesthestics, and task technology fit

Technology Characteristics

Communication support Fuller & Dennis (2009) Information processing support Fuller & Dennis (2009)

TAM Authors

Davis et al. 1989 - How does TRA and TAM explain intentions to use a system Davis 1989 - Technology Acceptance Model Ventkatesh et al. 2003 - Unified Theory of Acceptance and Use of Technology (UTAUT) Lee et al. 2003 - History and Limitations of Tam Benbasat and Barki 2007 - Provides recommendations on how to move forward with implementation studies

Measure to reduce systems risks:

Deterrence → Ex: policies & guidance. Passive. Prevention → Ex: password access controls. Active. Detection → Systems audits & virus scans. Proactive & reactive. Recovery Straub et al. 1998

Liu and Goodhue 2012

Focuses on the role of initial trust in creating to revisit a website. Web aesthetics, trust, and TTF effect intention to revisit a website Cognitive Miser - because of the tendency to reduce cognitive complexity, an accessible belief will not be utilized if it is not relevant (or "diagnostic") to the current processing object, because the increased cognitive complexity is not justified by the likely improvement in decision-making. --Above the tipping point - a user assumes the website is trustworthy and quits worrying about trust. --Below the tipping point - the consumer has not necessarily decided that the website is untrustworthy; user is still un sure of the trust worthiness

Gefen et al. 2003

Gefen et al. suggest that (a) institution-based trust (structural assurances and situational normality), (b) e-vendor familiarity, and (c) calculative based trust (i.e., when it is not worthwhile for the vendor to engage in opportunistic behavior because the costs of getting caught outweigh the benefits of cheating) are positively related with trust in the e-vendor. Moreover, institution-based situational normality and familiarity are also positively related to interface perceived ease of use, which in turn, is positively associated with trust. Additionally, trust leads to website perceived usefulness and both trust and PU are positively related to intended use. Results showed support to almost all assertions, with the exception of the link between e-vendor familiarity and trust (i.e., being familiar with the vendor does not mean that the customer trusts the e-vendor) Methods Field study - questionnaire Pre-test- 72 undergraduate students - questionnaire with regard to the last online book vendor or online CD vendor Web site at which they had made a purchase. PCA from 50 surveys of each construct

Authors- Affordance

Gibson 1977 - Definition of affordances: two reference points: the object and the observer Michaels 2003 - four points of debate for affordances in ecological contexts Majchrak and Markus 2013 - Introduce Technology Affordances and Constraints Theory Majchrak et al. 2013 - social media affordances on online communal knowledge sharing Vaast et al. 2017 - examine how social media use affords new forms of organizing in the context of the 2011 BP oil spill and connective action

Authors - Task Technology Fit

Goodhue and Thompson 1995 - Task Technology Fit Fuller and Dennis 2009 - Fit Appropriate Model/Time as a boundary condition Sarker and Valacich 2010 - adoption of groups Serrano and Karahanna 2016 - Context of e-consultation Diagnosticity Goodhue 2015 - performance is only impacted when technology fits and it used

Trust Authors

Granovetter 2017 - chapter that discusses definitions and sources of trust Sollner et al. 2016 - MISQ curation on trust Gefen et al. 2003 - integrates trust and its antecedents into TAM Pavlou and Gefen 2004 - institution-based trust to analyze consumers' intentions and behaviors using Amazon Auction Glickson and Woolley 2020 - Trust and AI

Habit/IS habit

Habit - learned sequences of acts that become automatic responses to specific situations, which may be functional in obtaining certain goals or end states" (Verplanken et al. 1997, p. 540). extent to which people tend to perform behaviors (use IS) automatically because of learning. (Limayem et al. 2007)

Polites and Karahanna 2012

Habit in Polites and Karahanna (2012) is argued to influence inertia. Habit is an automatically learned sequence of responses to specific cues. It has four dimensions: mental efficiency (free an individual resources of attention to other stuff), intentionality (goal oriented), awareness, and controllability (difficulty to control). Habit is subconscious while inertia could be both conscious and subconscious. Conscious factors that would influence inertia include sunk cost (psychological commitment) and the rational Results support the hypothesized relationships showing the inhibiting effect of incumbent system habit, transition and sunk costs, and inertia on acceptance of a new system. Moreover, inertia is an important mechanism via which incumbent system habits and perceptions of switching costs impact technology acceptance.

Four aspects of resistance

Hirscheim and Newman (1988) resistance variables in individuals, variables in the situation, variables in the change strategy adopted, perceived consequences of the change.

technology threat avoidance theory (TTAT)

IT threat avoidance is represented by a feedback look through two cognitive processes: threat appraisal and coping appraisal. Based on the outcome of this appraisal determines the coping mechanism employed, either emotion-focused or problem-focused coping. User's use Problem-focused coping when they perceive safeguard measures to be available or subjective emotion-based copings if they believe the threat is unavoidable. The authors state that this model explains why users employ active or passive responses to security threats Liang and Xue 2009

3 Shortfalls of real behavior

Incompleteness of knowledge - we have fragment knowledge about our surroundings Difficulty of Anticipation - Valuation is limited in its accuracy and consistency Scope of behavioral possibilities is unknown, to many sets of possible consequences to know (Simon 1969 Ch5

Task Characteristics

Intellective tasks (i.e., problem solving tasks) Fuller & Dennis (2009) Sensory requirements Serrano & Karahanna (2016) Trust requirements Serrano & Karahanna (2016)

Prospect Theory

Kahneman & Tversky (1979) - Behavioral model that shows how people decide between alternatives that involve risk and uncertainty (e.g. % likelihood of gains or losses). It demonstrates that people think in terms of expected utility relative to a reference point (e.g. current wealth) rather than absolute outcomes. - Risk Averse for losses - Risk seeking for gains Based on expected utility theory (Fishburn 1968)

Authors- Habit

Kim et al. 2005 - compares to views of automatic use: habit/automaticity perspective (HAP) and instant activation perspective (IAP) Limayem et al. 2007 - Extend Bhattercherjee's (2001) model of IT continuance by adding habit as a construct and the antcedents of habit Polites and Karahanna 2012 - Extends TAM by addings subjective norms

Authors - Resistance and Workarounds

Markus 1983 - power and politics - (1) People Determined Resistance (2) System Determined Resistance, and (3) Interaction Theory - Political Hirschheim and Newman 1988 - Types of resistance Lapointe and Rivard 2005 - multilevel nature of resistance; later episodes of resistance were characterized by active resistance and found that coalitions were forming. Ferneley and Sobreperez 2006 - positive and negative resistance

Psychology Papers

McLeod 2007 - Psychological Perspectives - Lists different types of psychological perspectives Mead 1913 - The Social Self - people are comprised of both the "I" and "Me Snow 2001 - Extending and Broadening Blumer's Conceptualization of Symbolic Interactionism Schultze 2012 - explore the identity performance in virtual environments to demonstrate the roles of both the physical and virtual bodies Ajzen 1991 - Theory of planned behavior Fishbein and Ajzen 1975 - Theory of Reasoned Action

Objective Rationality

Objective rationality - Complete and unattainable knowledge of the exact consequences of each choice Simon 1969 Ch 5

Open Source

Open source software was developed out of the term "free" software. This software is designed by programmers that give free access to the code to implement or further develop it. The main characteristic of open source software is that it is freely accessible to all. The two significant models presented in this article are the private innovation model and the collective action model. (von Hippel and von Krogh 2003)

Types of Ontology (Abbott 2004)

Positivism vs Interpretivism o Positivists - research is measurement and countingo Intepretvisits - interaction and intrepratation Analysis Vs Narration§ Narration = story telling§ Analysis = list various effects individual forces have on it Behaviorism vs Culturalism oSocial structure - regular, routine patterns of behavior o Social culture- systems of symbols by which people understand and direct their lives Behaviorism rejects any concerns with culture and meaningo Culturalism - social life is incomprehensible without invstigation of the symboloic systemsIndividualism and Emergentismo Indivudalism - only real entities in the social world are human individualso Emergentists - social is reals; i.e social forces on eventsRealism and Constructionism (objective and subjective)o Realism - social process is made up of well defined people and groups doing well understood things in specific environmento Constructionism- social is made up of people who construct their identities and selves in the process of interactions with one another. Contextualism and Noncontextualismo Contextualism - social statement or event has no meaning unless we know the context it appeared.o Noncontextualism - meaning of something is the same no matter the contextChoice and Constrainto Choice - how people make choiceso Constraint - Understanding - "why people have no choices to make" - not free to make own choicesConflict and Consensuso Consensus - people are inherently disorderly and social order is therefore precarious, social organizations and institutions keep people from destroying themselves. Norms, rules, and valueso Conflict - people are inherently good, their lives are clouded by oppressive institutions that make them act in socially constructive ways.Transcendent and Situated Knowledgeo Transcendent - universal knowledge - applies at all times and in all placeso Situated - transcendent knowledge is not possible

Authors - Technostress

Ragu-Nathan et al. 2008 - develops of measure of technostress Chen and Karahanna 2018 - examines after work related interuptions

Becker 1993 - Behavioral Economics

Rational Choice - Individuals are not motivated solely by selfishnes or material gain; Actions are constrained by income, time, imperfect memory and calculating capacities, and other limited resources, and also by the opportunities available in the economy and elsewhere Discrimination Against Minorities - Economic impacts of avoiding to hire the right person for the job Crime and Punishment - rationality implies there are rewards compared to the likelihood of apprehension and conviction. Human Capital - Workers with highly specific skills are less likely to quit their jobs and are the last to be laid off during business downturns. Formation, Dissolution, and Structure of Families - assumption that when men and women decide to marry, or have children, or divorce, they attempt to raise their welfare by comparing benefits and costs

What is risk

Risk is the uncertainty inherent in doing business; technically, it is the probability associated with losses (or failure) of a system multiplied by the dollar loss if the risk is realized."

Pavlou and Gefen 2004

Scraped - E-mail addresses of 1,600 buyers were randomly selected from 16,000 buyer addresses collected from Amazon's auction website using an e-mail extractor spider program. Investigate trust in online communities of sellers (Amazon). Results show that perceived effectiveness of feedback mechanisms and escrow services (e.g., paypal) alongside trust in the intermediary (Amazon) increased trust in the community of sellers (even when controlling for trust propensity). Trust decreases perceived risk from the community and increases transaction intentions. Perceived risk from the community of sellers, on the other hand, decreases intentions to buy a product in the marketplace. Trust in the intermediary and perceived effectiveness of the feedback mechanism are the strongest predictors of buyers' trust in the community of sellers. Perceived effectiveness of escrow services and credit card guarantees, however, played a weaker role

Limitations of TAM

Self-reported usage Tendency to examine only one IS Use of student subjects Cross-sectional studies. Lee et al. 2003

3 Types of Explanations

Syntactic - explains the social world by more and more abstractly modeling its particular action and interrelationships Semantic - explains the world of social particulars by assimilating it to more and more general patterns, searching for regularities over time or across social space. Pragmatic - clearly identifies the different potential interventions or causes (causality) (Abbott 2004)

Technology Affordances and Constraints Theory

TACT's essential premise is that, to understand the uses and consequences of information systems, one must consider the dynamic interactions between people and organizations and the technologies they use. o Technology affordance → refers to an action potential, that is, to what an individual or organization with a particular purpose can do with a technology or information system. o Technology constraint → refers to ways in which an individual or organization can be held back from accomplishing a particular goal when using a technology or system. o Both are relational concepts → potential interactions between people and technology, rather than as properties of either people or technology (Majchrak and Markus 2013)

Theory of Reasoned Action

TRA suggests that a person's behavior is determined by their intention to perform the behavior and that this intention is, in turn, a function of their attitude toward the behavior and subjective norms (Fishbein & Ajzen, 1975).

Fit Appropriation Model

TTF model is limited in its ability to predict performance because it does not address how individuals or teams change over a period of time. Appropriation - "how users select and use available technology, task, and other structures through their interactions and how users ascribe meaning to these structures." (Fuller and Denis 2009)

Vance et al. (2015)

The authors provide three research questions: RQ1: How can UI design artifacts increase perceptions of accountability in the users of a broad-access system? RQ2. Can increases in user accountability reduce intentions to violate access policies? RQ3. Does accountability mediate the effect of UI design artifacts on the intention to violate the access policy? To answers these questions, they performed a "novel application" of a factorial survey. They develop vignettes of realistic security situations and measured if the UIs increased four areas of perceived accountability: (1) identifiability, (2) expectation of evaluation, (3) awareness of monitoring, and (4) social presence. The authors found that perceived accountability strongly predicted the intention to violate the access policy. Moreover, they found that accountability mediates the UI design artifact's effects on the intentions to commit access policy violations.

Theory of Planned Behavior

The theory of planned behavior addresses the prediction of behavior through the constructs of motivation and ability. Motivation in this context refers to a subject's intentions to perform a given behavior. This theory has three major tenants: (1) Attitudes towards behavior, (2) subjective norms, (3) perceived behavioral control. Ajzen states that "intentions capture the motivational factors that influence a behavior" and that the stronger the intention is, the more likely behavior is to occur (Ajzen 1991 )

Task Technology Fit

Theory that posits that tasks characteristics and technology characteristics must come together for task performance and system utilization Goodhue 1995

Extended Security Action Timeline

They extend the security action timeline by addressing the antecedents of abuse. The antecedents address the perceived workplace environments, disgruntled employees, and organizational injustice prior to the formation of behavioral intentions to perform a computer-related abuse. (Willison and Wakentin 2013)

Chen and Karahanna 2018

To test their seven hypotheses, they use a two-stage methodology. They first used qualitative data from 16 interviews to identify the constructs of interruption overload, psychological transition, and task closure. The second phase consisted of a pilot study and a random sample of eSearch members. The authors found that the total effects of these interruptions are detrimental across both work and nonwork outcomes. Additionally, they found the strongest negative effect was on work exhaustion. Furthermore, they found that phone and text messaging lead to negative outcomes because of interruption overload, but that emails exhibit both positive and negative outcomes due to task closure and psychological transitions.

Vaast et al. 2017

Vaast et al. (2017) examine how social media use affords new forms of organizing in the context of the 2011 BP oil spill and connective action. The authors use mixed method techniques of grounded theory, inductive data analysis techniques for social media, and qualitative cluster analysis. The authors identify distinct patterns of how actors engage interdependently in teams. They identified three roles: advocates, supporters, and amplifiers. Furthermore, they identified three different types of interdependent connective action: (1) pooled, (2) sequential, and (3) reciprocal.

Unified Theory of Acceptance and Use of Technology (UTAUT)

Venkatesh et al. 2003 - provide a unified view of all the models that are used in literature to explain the determinants of behavioral intention and usage of information systems. --uses the most significant aspects of each of the eight models and develops four constructs and four moderators for determining behavioral intentions .--four constructs and four moderators for determining behavioral intentions. The four constructs are performance expectancy (usefulness), effort expectancy (ease of use), social influence (subjective or social norms/factors), and facilitating conditions (perceived behavioral control or compatibility). Additionally, the four moderators are gender, age, experience, and voluntariness of use (compared to mandatory use)- Authors found that the UTAUT model explains as much as 70% of the variance in intention

Work Arounds

Work around - 'informal temporary practices for handling exceptions to workflow' Identified six basic categories: compliance, positive resistance, negative resistance, harmless workarounds, hindrance workarounds and essential workarounds. (Ferneley and Sobreperez 2006)

Rational Agent Model

agents make their choices in a comprehensively inclusive context, which incorporates all the relevant details of the present situation, as well as expectations about all future opportunities and risks (Kahneman 2003) Issue: central characteristic of agents is not that they reason poorly but that they often act intuitively. And the behavior of these agents is not guided by what they are able to compute, but by what they happen to see at a given moment.

Endowment Effect

an emotional bias that causes individuals to value an owned object higher, often irrationally, than its market value. Kahneman 2003

Intertia

attachment to, and persistence of, existing behavioral patterns (some of which are habituated) even if there were better alternatives and incentives to change. Polites and Karahanna 2012 behavior-based - what the individual has always done cognitive based - individual consciously used a inferior system, making similar decision inspite of new information incumbent system habit sunk cost transition cost

Status Quo Bias

decision-makers may be biased towards maintaining the status quo through the mechanisms such as rational decision-making based on perceived costs of transitioning to a new course of action....Leads to Inertia (Polities and Karahanna 2012)

Techniques and actions to reduce security risk

deterrence, prevention, detection, and recovery. "Hence, organizations would first attempt to address the risks posed by the insider by deterring potentially dishonest staff. If this fails, preventive measures would aim to stop the commission of computer abuse, followed by efforts targeted at detection, and finally the pursuit of remedies." (Willison & Warkentin, 2013, p. 3). The argument of the paper is that organization have to work in order to maximize deterrence and prevention, and minimize remedy and detection efforts. They define general detergency theory as "individuals with an instrumental intent to commit antisocial acts can be dissuaded by the administration of strong disincentives and sanctions relevant to these acts. Terms, active and visible policing is thought to lower computer abuse by convincing potential abusers that there is too high a certainty of getting caught and punished severely." They use this to develop a theory-based security program with three elements: (1) use of a security risk planning model, (2) education/training in security awareness, and (3) countermeasure Matrix Straub et al. 1998

Affordances and constraints are distinct from:

distinct from: o Technology features → which are functionalities built into information systems either by design or by accident. o human and organizational attributes → such as tasks, needs, and purposes (Majchrak and Markus 2013)

IS Performance

e-consultation diagnosticity Serrano & Karahanna (2016) Decision quality (effectiveness) Fuller & Dennis (2009) Time to perform the task (efficiency) Fuller & Dennis (2009)

Davis et al. 1989

examined both the Theory of Reasoned Action (TRA) and Technology Acceptance Model (TAM). They used 107 MBA students from Michigan University to determine their intent to use a word-processing system three primary findings: (1) People's computer use can be predicted reasonably well from their intentions. (2) Perceived usefulness is a major determinant of people's intentions to use computers. (3) Perceived ease of use is a significant secondary determinant of people's intentions to use computers.

Technostress creators

factors that create technostress in the organization (e.g., constant connectivity, ever-changing software). Ragu-Nathan et al. 2008

Cognitive Miser

focus on aspects most relevant to the immediate concern rather than engaging in an exhaustive processing of all potentially salient characteristics (Liu & Goodhue 2012)

Conservation of Resource Theory

individuals strive to conserve and acquire valued resources, which include time, energies, conditions, objects, and personnel characteristics. Chen and Karahanna 2018

Bounded Rationality

knowledge about each choice consequence is fragmentary, choice consequences are future events where imagination is used to substitute for the lack actual experience of these consequences, and the number of alternatives are huge that it is hard generate and evaluate all of them (Simon 1947, chapter 5) Kahneman (2003) Cognitive limitations that constrain one's ability to interpret, process, and act on information

Technostress

modern disease of adaptation caused by an inability to cope with new computer technologies in a healthy manner" (Brod 1984) 2nd order constructs - Technostress creates, technostress inhibitors Ragu-Nathan et al. 2008

Assumptions of cognitive science

o Humans act in self-maximization matter. o Perfect information o Humans act rationally → mathematically. o When they say value, they talk about money or cash.

Causes of Resistance

o Innate conservatism o Lack of felt need o Uncertainty o Lack of involvement in the change o Redistribution of resources o Organizational invalidity - mismatch beween features and characteristic of existing organization o Lack of management support o Poor technical quality o Personal characteristics of the designer o Other casues...training, educations, expectations Hirschheim and Newman 1988

Habits (Simon 1969)

o Permits conservation of mental effort by withdrawing from the area of conscious thought those aspects of the situation that are repetitive. o Permit similar stimuli or situations to be met with similar responses or reactions, without the need for a conscious re-thinking of the decision to bring about proper action

Majchrak et al. 2013

point to idea that the affordance lens can help in identifying not only positive consequences of technology, but also the negative consequences that are unintended when designing and implementing the technology.

Davis, F. D. (1986)

provide better measures for predicting and explaining the use of information systems. The authors present two measures: Perceived Usefulness and Perceived Ease. Perceived usefulness is defined as "the degree to which a person believes that using a particular system would enhance his or her job performance." Perceived ease of use is defined as "the degree to which a person believes that using a particular system would be free of effort."

Dimensions of Emotional Trust in AI

tangibility, anthropomorphism, and immediacy behaviors (Glickson and Woolley 2020 )

Dimensions of Cognitive Trust in AI

tangibility, transparency, reliability, task characteristics, and immediacy behaviors (Glickson and Woolley 2020 )

Five factors of technostress creators

techno-overload, techno-invasion, techno-complexity, techno-insecurity, and techno-uncertainty.Ragu-Nathan et al. 2008

Ragu-Nathan et al. 2008 Results

technostress creators decrease job satisfaction and technostress inhibitors increase job satisfaction, and organizational and continuance commitment. Also organizational commitment increases continuance commitment. four individual characteristics (gender, age, education, and computer confidence) on technostress- results showed that males experienced more technostress than females and that technostress decreased as age, education, and computer confidence increased.

Cognitive Science

the interdisciplinary study of mind and intelligence, embracing philosophy, psychology, artificial intelligence, neuroscience, linguistics, and anthropology. (Thagard 2010)

Technistress inhibitors

the situational variables within an organization that reduce the effects of technostress (e.g., training) Ragu-Nathan et al. 2008

Authors - Peer Production and Open Source

von Hippel and von Krogh 2003 - Private collective innovation model Roberts et al. 2006 - examine the interrelationships between the motivations, participation, and performance of Open Source Software developers. Stewart and Gosain 2006 - examine the relationship between ideology, communication, and trust on determining the effectiveness of Open Source Software projects. von Krogh et al. 2012 - examines the motivation to contribute to open source software development projects Shaikh and Vaast 2016 - Folding and Unfolding: Balancing Openness and Transparency in Open Source Communities

Affordance descriptions

• "Affordances are the actions permitted an animal by environmental objects, events, places, surfaces, people, and so forth. An action is understood as a goal-directed movement (or nonmovement) that entails intention, the detection of information, and a lawful relation between that information and the control of movement. • An affordance, if not measured in intrinsic units, will be a multidimensional compound of properties from other measurements, descriptive, or conceptual systems (e.g., throwable constitutes rigid, volume<0.1m3, 2g - 10 kg in mass, etc.). • Affordance should not be equated with any arbitrary action component or action aggregation; it refers only to the action level. The proper tools (perhaps the tools of intentional dynamics) will be necessary to enumerate the necessary conditions for membership in the category action and to determine whether some segment in an animal's behavioral timeline qualifies as an action. • Affordances exist independent of being perceived.• Affordances are specified by information and may be perceived. Perceiving an affordance is seeing that some action can be engaged in by the perceiver-actor himself or herself; it does not perceive what actions others can engage in. • An affordance entails an effectivity for its actualization but not for its existence." (Michaels 2003)


Related study sets

Mastering Bio Reproductive System

View Set

Life Insurance Underwriting and Policy Issue

View Set

Chapter 6 CEN 4010, Chapter 7 CEN 4010, Chapter 8 CEN 4010, Chapter 9 CEN 4010, Chapter 10 CEN 4010, Chapter 11 CEN 4010

View Set

Micro-Economics Final Practice Questions

View Set

PSYCH 2301.030 Thinking like a Psychologist Scientist Review

View Set

Anatomy and Physiology Chapter 6

View Set