Wednesday, October 29, 2008

Journal of the American Society for Information Science & Technology - Influences of IT Substitutes & User Experience on Post-Adoption User Switching

I have authored a paper along with C. Ye, D. Seo, S. Papagari, and S. Jha, which appears in the current issue of the Journal of the American Society for Information Science and Technology [Link]


Ye, C., Seo, D., Desouza, K.C., Sangareddy, S.R. P., and Jha, S. “Influences of IT Substitutes and User Experience on Post-Adoption User Switching: An Empirical Investigation,” Journal of the American Society for Information Science and Technology, 59 (13), 2008, 2115-2132.
Abstract
This study examines factors that influence individual users' post-adoption switching behavior between information technology products that are near perfect substitutes. The introduction and popularity of Mozilla Firefox Web browser provided an ideal empirical setting for this study. Drawing upon literature on post-adoption user behavior, consumer behavior, and online user research, we propose a research model and validate it using cross-sectional field data collected from 306 users on their decision to switch from Microsoft Internet Explorer (IE) to Mozilla Firefox. Findings suggest that user satisfaction and breadth of use of the incumbent product are negatively associated with switching behavior. Perceived ease of use, relative advantage, and perceived security of the substitute product are positively associated with switching behavior. In addition, the effects of perceived ease of use and relative advantage are not moderated by user experience. This study contributes to both research and practice by advancing our understanding of information technology (IT) users' post-adoption behavior in general and their switching behavior on Web-related IT products specifically.

Friday, October 24, 2008

Constructing and Sustaining Competitive Interorganizational Knowledge Networks - Information Systems Management

I have authored a paper along with R. Hackney and Z. Irani, which appears in the current issue of Information Systems Management


Abstract: The research in this paper considers the complex and dynamic arrangements for potential and actual knowledge sharing in interorganizational networks. The essence of this stance is that “knowledge” relates to affirmative managerial action beyond the necessary collection of information facilitated through technology. The issue is to determine the nature and extent of the degree of organizational agreement that may be achieved as competitors either cooperate or continue to compete in the face of challenging and pervasive market conditions. The theory relating to network formulation is reviewed, findings from empirical analyses from the experiences from automobile distributors in a large USA city, and one scientific collaborators network are presented. A framework is proposed identifying the factors necessary to initially construct the network and then to further sustain it over time. A number of lessons learned are developed, which are believed to be of value to researchers and practitioners engaged in these processes.
Ray Hackney; Kevin C. Desouza; Zahir Irani, Constructing and Sustaining Competitive Interorganizational Knowledge Networks: An Analysis of Managerial Web-Based Facilitation, Information Systems Management, 25 ( 4), 2008, 356 - 363.

The neglected dimension in strategic sourcing: security - Strategic Outsourcing: An International Journal

I have authored an opinion piece that appears in the current issue Strategic Outsourcing: An International Journal.

The neglected dimension in strategic sourcing: security

Structured Abstract
Purpose – The purpose of this paper is to focus on a neglected dimension in strategic sourcing – security; Design/methodology/approach – The paper describes two vignettes which illustrate different kinds of security breaches and discusses securing strategic sourcing efforts; Findings – The paper points to the need to seriously consider the security dimension in sourcing agreements; Originality/value – This paper will hopefully raise awareness to the security dimension in the context of strategic sourcing.

LINK

Monday, October 13, 2008