[PDF] Three Essays In Information Systems - eBooks Review

Three Essays In Information Systems


Three Essays In Information Systems
DOWNLOAD

Download Three Essays In Information Systems PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Three Essays In Information Systems book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page





Three Essays In Information Systems


Three Essays In Information Systems
DOWNLOAD
Author : Jayarajan Samuel
language : en
Publisher:
Release Date : 2018

Three Essays In Information Systems written by Jayarajan Samuel and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2018 with Computer networks categories.


This dissertation tackles three problems in information systems: In the first essay we investigate the value of a local showroom to online competition. An increasing number of online retailers are grappling with whether to expand their operations to offline local showrooms. In this study, we quantify the value of showrooms by investigating how the presence and absence of local showrooms may impact customers’ searching and purchasing behaviors with online competitors. By using an exogenous event of a large retailer’s offline market exit and a unique data set capturing customers’ online browsing and purchasing activities before and after the event, we empirically examine the changes in online search and sales made by customers who lived within neighborhoods where showrooms closed. We question the adequacy of conventional sales-based measures and devise several search-based measures in order to better quantify the value of a showroom from the perspective of customer experience online. Using a difference-in-difference approach, we find mixed results in terms of online competitors’ sales when a neighboring showroom closes. More importantly, we observe an increase in customers’ online search intensity in the absence of local showrooms. We discuss a wide range of implications both for online and offline retailers based on our results. The second problem we analyze is the effect of worker collaboration on productivity and costs to a company. Although collaboration in the workplace is promoted as a silver bullet for increasing productivity and decreasing costs, there is little empirical evidence to show the effects of collaboration. Using a unique dataset and a field experiment we develop a framework to measure the effects of collaboration in a service delivery industry. Our results show that when collaboration is forced on employees, although productivity increases, costs also increase. Based on our conclusions we recommend management to allow employees to choose when to collaborate and when not to. On further analysis of the implementation of our recommendations, we find that productivity levels increase along with reduction in costs if employees are allowed to choose when to collaborate on tasks. Finally, we investigate how to tackle the patching schedule of custom built enterprise systems. Keeping software systems safe from hackers is one of the most important goals for system operations managers. A system that has outstanding security patches is inherently risky and managers incur costs to keep the security of such systems at an acceptable level. Alternatively, they can choose to expend resources to apply outstanding patches and increase the security state of the system and thereby reducing the costs to maintain the system. In this research we study a motivating example from the Information and Communications Technology (ICT) industry and apply a control theoretic model to solve for optimal patching periods. The optimal patching policy is shown to have a bang-bang solution which explains common approaches practiced in the industry. The results in this research are valuable to operations and maintenance managers who strive to keep enterprise software systems safe while minimizing cost.



Three Essays On Information Systems Design


Three Essays On Information Systems Design
DOWNLOAD
Author : Yonghua Ji
language : en
Publisher:
Release Date : 2003

Three Essays On Information Systems Design written by Yonghua Ji and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2003 with Computer programming categories.




Three Essays On Information Systems Development


Three Essays On Information Systems Development
DOWNLOAD
Author : Grégory Vial
language : en
Publisher:
Release Date : 2016

Three Essays On Information Systems Development written by Grégory Vial and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2016 with categories.




Three Essays On Information Systems Outsourcing


Three Essays On Information Systems Outsourcing
DOWNLOAD
Author : Kichan Nam
language : en
Publisher:
Release Date : 1997

Three Essays On Information Systems Outsourcing written by Kichan Nam and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 1997 with categories.




Three Essays On Information Technology Sourcing


Three Essays On Information Technology Sourcing
DOWNLOAD
Author : Wen Guang Qu
language : en
Publisher:
Release Date : 2008

Three Essays On Information Technology Sourcing written by Wen Guang Qu and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2008 with Information technology categories.




Three Essays On Success Factors For Information Systems


Three Essays On Success Factors For Information Systems
DOWNLOAD
Author : Roger Holland Blake
language : en
Publisher:
Release Date : 2008

Three Essays On Success Factors For Information Systems written by Roger Holland Blake and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2008 with Data mining categories.




Three Essays On Behavioral Aspects Of Information Systems


Three Essays On Behavioral Aspects Of Information Systems
DOWNLOAD
Author : Sangmi Chai
language : en
Publisher:
Release Date : 2009

Three Essays On Behavioral Aspects Of Information Systems written by Sangmi Chai and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2009 with categories.


In the information age, it is important to investigate information systems in relationship to society, in general, and various user groups, in particular. Since information technology requires interactions between people and their social structure, research in information system usage behavior needs to be based on a deep understanding of the interrelation between the technology and the social environment of the user. This dissertation adopts a socio-technical approach in order to better explore the role of information technology in the important research issues of online privacy and information assurance. This dissertation consists of three essays. The first essay investigates factors that affect the career decisions of cyber security scholars. In the recent past, cyber security has become a critical area in the Information Technology (IT) field, and the demand for such professionals has been increasing tremendously.^However, there is a shortage of qualified personnel, which is a factor that contributes greatly to the society's vulnerability to various cyber threats. To date, there is no academic extent research regarding the cyber security workforce and their career decisions. Based on the theories of planned behavior and self-efficacy, our study articulates a model to explain career selection behavior in the cyber security field. To provide validity for the proposed conceptual framework, we undertook a comprehensive empirical investigation of Scholarship for Service (SFS) Scholars who are funded by the National Science Foundation and who are studying information assurance and computer security in universities. The results of this research have implications for retaining a qualified workforce in the computer and information security fields. The second essay explores internet users' online privacy protection behavior.^Information security and privacy on the Internet are critical issues in our society. In this research, factors that influence internet users' private information sharing behavior were examined. Based on a survey of two of the most vulnerable groups on the web, 285 pre- and early teens, this essay provides a research framework that explains in the private information sharing behavior of Internet users. According to our study results, Internet users' information privacy behaviors are affected by two significant factors: the perceived importance of information privacy and information privacy self-efficacy. It was also found that users' belief in the value of online information privacy and information privacy protection behavior varies by gender. Our research findings indicate that educational opportunities regarding Internet privacy and computer security as well as concerns from other reference groups (e.g.^peers, teachers, and parents) play an important role in positively affecting Internet users' protective behavior toward online privacy. The third essay investigates knowledge sharing in the context of blogs. In the information age, web 2.0 technology is receiving growing attention as an innovative way to share information and knowledge. This study articulates a model, which enables the understanding of bloggers' knowledge sharing practices. It identifies and describes the factors affecting their knowledge sharing behavior in online social networks. The analysis of 446 surveys indicates that bloggers' trust, strength of social ties and reciprocity all have a positive impact on their knowledge sharing practices. Their online information privacy concerns, on the other hand, have a negative impact on their knowledge sharing behavior. More importantly, the amount of impact for each factor in knowledge sharing behavior varies by gender .^The research results contribute toward an understanding of the successful deployment of web 2.0 technologies as knowledge management systems and provide useful insights into understanding bloggers' knowledge sharing practices in online communities.



Three Essays On Risks Of Online Platform Information Systems


Three Essays On Risks Of Online Platform Information Systems
DOWNLOAD
Author : Shuting Wang
language : en
Publisher:
Release Date : 2019

Three Essays On Risks Of Online Platform Information Systems written by Shuting Wang and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2019 with categories.


In the past decade, a fundamental research topic in the information systems (IS) discipline has been to examine the value of online platforms on businesses, society, and consumers, notably in the form of improved efficiency in information sharing, consumer engagement, and increased sales. However, the risks rooted in online platforms may cannibalize the value created, which have received limited attention in the literature and practice. In my dissertation, I attempt to fill this gap in the literature by providing a comprehensive analysis of the risks of online platforms from the angle of these three main entities in the ecosystem with three separate yet related essays. The first essay focuses on the risks for businesses that leverage social media platforms, and assesses how their posting on social media fan pages affects consumers' decision to purchase and unfollow from the firms. The second essay focuses on the risks of fake news on social media and how social media platforms may use identity verification to reduce online anonymity and combat this increasingly critical social problem. The third essay focuses on estimating the risks of using monetary incentives to motivate consumers to write online product reviews, and examines how such strategy may affect product sales. Our studies have theoretical and practical implications for designing effective online platform information systems.



Three Essays On Information Technology Security Management In Organizations


Three Essays On Information Technology Security Management In Organizations
DOWNLOAD
Author : Manish Gupta
language : en
Publisher:
Release Date : 2011

Three Essays On Information Technology Security Management In Organizations written by Manish Gupta and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2011 with categories.


AbstractIncreasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to severely impact firm's performance and their market valuation. The dissertation comprises of three essays that address strategic and operational issues that organizations face in managing efficient and secure information technology environment. As organizations increasingly operate, compete and cooperate in a global context, business processes are also becoming global to generate benefits from coordination and standardization across geographical boundaries. In this context, security has gained significance due to increased threats, legislation and compliance issues.^The first essay presents a framework for assessing the security of Internet technology components that support a globally distributed workplace. The framework uses component analysis to examine various aspects of a globally distributed system - the technology components, access channels, architecture and threats. Using a combination of scenarios, architectures and technologies, the paper presents the framework as a development tool for information security officers to evaluate the security posture of an information system . The management and planning of large complex deployments are inherently difficult and time consuming, which are also widely evidenced to have unusually high failure rates. The second essay develops a risk-aware cost model to aid companies to transition to having a single sign on system using a multi-phase pattern of software implementation.^The integer programming-based optimization model provides guidance on the software that should be implemented in each phase taking risk and budgetary constraints into account. The model provides a cost optimal path to migrating to a single sign-on system, while taking into account individual application characteristics as well as different learning aspects of organizational system implementation. The model can be used by managers and professionals in architecting their own software deployment plans in multiple stages to address resource constraint issues such as manpower and budget, while also effectively managing risks. The results of the model show significant cost benefits and effective risk management strategies. This will help organizations from an operational and tactical perspective during implementation of a distributed software system. There has been a tremendous increase in frequency and economic impact potential of security breaches.^Numerous studies have shown that there is significant negative impact on market valuation of the firm that suffered security breach. Extensive literature review reveals that studies have not examined companies' response to security breaches in terms of media announcements about security initiatives and improvements. The third essay investigates whether security breaches lead to announcements of security investments / improvements by the affected companies; and the market reaction to these announcements. In addition, the essay also explores (a) how announcements of remediation and/or of positive investments or improvements in security relate to security breach announcements? (b) effective timing strategies to respond and to release announcements relating to security improvements/initiatives to maximize the favorable impact and (c) the effect of security breach announcements on competitor's market valuation and d) impact of announcements' content on stock price.^The results of the research indicate that there is positive significant market reaction to announcements regarding security improvements made by companies that had a security breach incident. The study also reveals that impact on stock price of competitors is moderated by their industry. The research used event studies and time series analyses to uncover how timing impacts the stock performance, of companies making positive security related announcements in news media, in an attempt to restore image and reputation after a security breach. The results reveal that timing of the announcement, after a breach, significantly influences the impact on stock prices.



Three Essays On Users Reactions To Information Technology


Three Essays On Users Reactions To Information Technology
DOWNLOAD
Author : Fatou Bagayogo
language : en
Publisher:
Release Date : 2014

Three Essays On Users Reactions To Information Technology written by Fatou Bagayogo and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2014 with categories.


"Although the extant literature has brought important insight to the study of individual users' reactions to information technology (IT), some limitations remain. Indeed, few studies theorize specifically about the IT artifact and incorporate these theories in the study of IT use. Also, the literature is dominated by an underlying assumption that acceptance of IT is favorable while resistance to IT is unfavorable. Another limitation is that this literature largely adopts a lean conceptualization of IT use and lacks a focus on the process of IT use (e.g. the process by which individuals make new uses of IT features). This dissertation tries to address these limitations and sheds light on important themes related to users' reactions to IT.Our first essay studies users' perceptions with regards to the modifications to an IT that occur after its implementation. Although these modifications potentially influence IT use and its impacts, they have hardly been studied from the end user's perspective. We propose and validate an artifact-focused measure of perceptions of IT modifications based on whether or not a user considers that the changes add new functionalities, improve existing functionalities, remove parts of the system, improve compatibility with other technologies and/or improve the system's speed and reliability. Our proposed measure contributes to studying users' reactions to IT, by focusing on the IT artifact; it also paves the way for further research on the very important and increasingly pervasive phenomenon of IT evolution.Our second essay proposes a framework that focuses on acceptance and resistance, and investigates the diverse set of IT- related behaviors and impacts that may be associated with them. It uncovers nuances obscured by the fact that these variables are generally considered separately, and in abstraction of the organizational context of use. With the concept of organizational intent, we show that resistance and employees' deviation from organizational IT use mandates sometimes benefit the organization. At the same time, acceptance and compliance with organizational IT use mandates may, at times, have adverse consequences. We also highlight scenarios under which employees and organizations can challenge these mandates to enable more favorable impacts. The last essay is an in-depth study of the process of using IT features in new ways, which we call 'enhanced use'. Based on interview data, we identify distinct patterns of enhanced use and the ways these patterns are influenced by task, user and system-related variables. We argue that the locus of innovation for enhanced use often differs according to the analyzability of the task and the type of system used. Also, the extent of substantive use involved in enhanced use depends largely on the complexity of the task at hand and on the IT-related knowledge used. Finally, our analysis suggests that the degree of task interdependencies and the type of system used are often associated with different patterns of adaptation for enacting enhanced use. Overall, we contribute a broad sketch of the interplay between the task-, IT- and knowledge-related variables that shape patterns of features adoption, use and extension after an IT is adopted.In sum, this dissertation enriches the research on users' reactions to IT. It focuses on important themes related to IT use including users' perceptions of IT changes, the impacts of different IT-related behaviors and the process of making new uses of IT features." --