Atjaunināt sīkdatņu piekrišanu

Information Systems Theory: Explaining and Predicting Our Digital Society, Vol. 1 2012 ed. [Hardback]

  • Formāts: Hardback, 502 pages, height x width: 235x155 mm, weight: 951 g, XXVI, 502 p., 1 Hardback
  • Sērija : Integrated Series in Information Systems 28
  • Izdošanas datums: 20-Sep-2011
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1441961070
  • ISBN-13: 9781441961075
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 207,56 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 244,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 502 pages, height x width: 235x155 mm, weight: 951 g, XXVI, 502 p., 1 Hardback
  • Sērija : Integrated Series in Information Systems 28
  • Izdošanas datums: 20-Sep-2011
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1441961070
  • ISBN-13: 9781441961075
Citas grāmatas par šo tēmu:
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives:





To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model. To discuss how a theory can be used to better understand how information systems can be effectively deployed in todays digital world.  

This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections.

The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, PortfolioTheory, Discrepancy Theory Models, and eleven others.

The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others.   The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others.

Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.
1 The Updated DeLone and McLean Model of Information Systems Success
1(18)
Nils Urbach
Benjamin Muller
1.1 Introduction
2(1)
1.2 Development of the D&M IS Success Model
3(1)
1.3 Constructs and Measures
4(4)
1.3.1 System Quality
4(1)
1.3.2 Information Quality
5(1)
1.3.3 Service Quality
5(1)
1.3.4 Intention to Use/Use
6(1)
1.3.5 User Satisfaction
7(1)
1.3.6 Net Benefits
7(1)
1.4 Construct Interrelations
8(3)
1.4.1 System Use
9(1)
1.4.2 User Satisfaction
10(1)
1.4.3 Net Benefits
11(1)
1.5 Existing Research on IS Success
11(2)
1.6 Conclusion
13(6)
References
14(5)
2 If We Build It They Will Come? The Technology Acceptance Model
19(18)
Joseph Bradley
2.1 Introduction
20(1)
2.2 Literature Review
21(11)
2.2.1 Expectancy-Value Theory
21(1)
2.2.2 Theory of Reasoned Action
22(1)
2.2.3 Technology Acceptance Model
23(1)
2.2.3.1 TAM Variables
24(1)
2.2.3.2 Impact of TAM
25(1)
2.2.3.3 Types of Information Systems Examined
25(1)
2.2.3.4 External Variables Tested
25(1)
2.2.3.5 TAM Publications
26(1)
2.2.3.6 Characteristics of Research Subjects
26(1)
2.2.3.7 Major Limitations of the Model
27(1)
2.2.3.8 Most Published Authors
27(1)
2.2.3.9 Recent TAM Research
27(1)
2.2.4 TAM Model Elaborations
28(1)
2.2.4.1 TAM2
28(1)
2.2.4.2 Unified Theory of Acceptance and Use of Technology (UTAUT)
29(1)
2.2.4.3 TAM and Task-Technology Fit Model
30(1)
2.2.4.4 TAM3
31(1)
2.3 Future of the Technology Acceptance Model
32(1)
2.4 Conclusions
33(4)
References
34(3)
3 A Bibliometric Analysis of Articles Citing the Unified Theory of Acceptance and Use of Technology
37(26)
Michael D. Williams
Nripendra P. Rana
Yogesh K. Dwivedi
3.1 Introduction
38(1)
3.2 Methodology
39(1)
3.3 Findings
40(15)
3.3.1 Demographic Data: Citations by Year
40(1)
3.3.2 Demographic Data: Citations by Journal/Source
40(1)
3.3.3 Demographic Data: Most Cited Citations
41(1)
3.3.4 Analysis and Systematic Review of Articles Citing the UTAUT Originating Article
42(1)
3.3.4.1 Citations with No Use of UTAUT
42(1)
3.3.4.2 Citations with Use of UTAUT with Different Research Methods
43(1)
3.3.4.3 Citations with Partial Use of UTAUT
43(1)
3.3.4.4 Citations with Complete Use of UTAUT
43(3)
3.3.5 IS Research Topics and Types of IS Examined
46(1)
3.3.5.1 Keyword Analysis
46(3)
3.3.5.2 Types of IS Investigated
49(1)
3.3.6 Methodological Analysis
49(1)
3.3.6.1 Research Methods
50(1)
3.3.6.2 Types of Users
51(1)
3.3.6.3 Sample Size
52(1)
3.3.7 Theoretical Analysis
52(1)
3.3.7.1 External Variables Analysis
53(1)
3.3.7.2 External Theories Analysis
54(1)
3.3.7.3 Relationships of External Variables with UTAUT Constructs
54(1)
3.4 Discussion
55(2)
3.5 Conclusion
57(6)
References
58(5)
4 Why Do People Reject Technologies: A Review of User Resistance Theories
63(24)
Sven Laumer
Andreas Eckhardt
4.1 Introduction
64(1)
4.2 Resistance, Rejection, and Non-Adoption
65(2)
4.3 User Resistance Theories
67(15)
4.3.1 Multilevel Model of Resistance to Information Technology Implementation
69(2)
4.3.2 Power, Politics, and MIS Implementation
71(1)
4.3.3 A Model of Users' Perspective on Change
72(1)
4.3.4 Passive Resistance Misuse
73(2)
4.3.5 An Attributional Explanation of Individual Resistance
75(2)
4.3.6 Inhibitors and Enablers as Dual Factor Concepts in Technology Usage
77(2)
4.3.7 Physicians' Resistance Toward Health-Care Information Technology
79(1)
4.3.8 Analyzing Workplace Referents' Social Influence on IT Non-adoption
80(1)
4.3.9 Investigating User Resistance to Information Systems Implementation: A Status Quo Bias Perspective
80(2)
4.4 Outlook
82(5)
References
84(3)
5 Task-Technology Fit Theory: A Survey and Synopsis of the Literature
87(20)
Brent Furneaux
5.1 Introduction
88(1)
5.2 The Theory
88(2)
5.3 Literature Survey and Synopsis
90(11)
5.3.1 Definition of Task-Technology Fit
91(2)
5.3.2 Operationalization of Task-Technology Fit
93(2)
5.3.3 Research Contexts Employed by TTF Research
95(2)
5.3.4 Key Outcomes of Interest to TTF Researchers
97(1)
5.3.5 Summary Framework
98(3)
5.4 Discussion
101(1)
5.5 Conclusion
102(5)
References
102(5)
6 Migrating Processes from Physical to Virtual Environments: Process Virtualization Theory
107(18)
Eric Overby
6.1 Introduction
108(1)
6.2 Definitions
108(3)
6.3 Process Virtualization Theory: Constructs and Relationships
111(6)
6.3.1 Dependent Variable
111(1)
6.3.2 Independent Variables
111(1)
6.3.2.1 Characteristics of the Process
112(1)
6.3.2.2 Characteristics of the Virtualization Mechanism
113(2)
6.3.3 Clarifications and Adjustments to Process Virtualization Theory
115(1)
6.3.4 Comments on Empirical Testing
116(1)
6.3.5 Illustration
116(1)
6.4 Relationship of Process Virtualization Theory to IS Research
117(5)
6.4.1 The Process Virtualization Theme Within IS
117(1)
6.4.1.1 IS Research on Distributed Decision Support Systems and Virtual Teams
118(1)
6.4.1.2 IS Research on Electronic Commerce
118(1)
6.4.1.3 IS Research on Distance Learning
119(1)
6.4.1.4 IS Research on Business Process Reengineering and Disaggregation
119(1)
6.4.2 Process Virtualization Theory and Other IS Theories
119(1)
6.4.3 A "Native" Information Systems Theory
120(2)
6.5 Conclusion
122(3)
References
122(3)
7 The Theory of Deferred Action: Purposive Design as Deferred Systems for Emergent Organisations
125(26)
Nandish V. Patel
7.1 Introduction
125(1)
7.2 The Adaptive IS Problem
126(2)
7.3 A Theory of IS
128(1)
7.4 Theorisation
129(1)
7.5 Deferred Action as Controlled Emergence of Organisation and Systems
130(6)
7.6 Implementing Deferred Action
136(1)
7.7 Data, Information and Knowledge
137(1)
7.8 Formal Models
138(4)
7.8.1 Real Systems
139(1)
7.8.2 Deferred Systems
140(1)
7.8.3 Specified Systems
141(1)
7.8.4 Autonomous Systems
141(1)
7.9 Design Principles for the Practice Framework
142(2)
7.9.1 Under-Specification
142(1)
7.9.2 Functional Deferment Points
143(1)
7.9.3 Self-Organising
143(1)
7.9.4 Adaptation
143(1)
7.9.5 Ethics
143(1)
7.9.6 Deferred Design Decisions
144(1)
7.10 Instantiations of Deferred Systems
144(2)
7.10.1 Legal Arbitration IS
145(1)
7.10.2 E-Learning
145(1)
7.10.3 Deferred Information Technology
146(1)
7.11 Discussion
146(1)
7.12 Limitations and Further Theory Development Work
147(1)
7.13 Conclusion
148(3)
References
148(3)
8 Resource-Based View Theory
151(14)
Mahdieh Taher
8.1 Introduction
152(2)
8.2 Literature Review
154(5)
8.2.1 Competitive Advantage
154(1)
8.2.2 Resources
155(1)
8.2.2.1 Resource Characteristics
155(2)
8.2.3 Capabilities
157(2)
8.3 Application of RBV in IS Research
159(1)
8.3.1 Information System Resources and Capabilities
159(1)
8.4 Resource Orchestration
160(1)
8.5 Conclusions and Future Research
160(5)
References
161(4)
9 On the Business Value of Information Technology: A Theory of Slack Resources
165(34)
Yasser Rahrovani
Alain Pinsonneault
9.1 Introduction
166(1)
9.2 Theoretical Background
167(3)
9.2.1 Organizational Slack
167(1)
9.2.1.1 Organizational Slack and Effectiveness
168(1)
9.2.1.2 Organizational Slack and Efficiency
169(1)
9.2.1.3 Organizational Slack and Redeployability
169(1)
9.3 IT Slack Conceptualization
170(2)
9.3.1 IT Slack and Redeployability
171(1)
9.3.2 The Value of IT Slack
171(1)
9.4 A Typology of IT Slack
172(6)
9.4.1 Type 1 -- IT Infrastructure-Artifact Slack
175(1)
9.4.2 Type 2 -- IT Infrastructure-Human Resource Slack
176(1)
9.4.3 Type 3 -- IT Infrastructure-Time Slack
176(1)
9.4.4 Type 4 -- IT Application-Artifact Slack
177(1)
9.4.5 Type 5 -- IT Application-Human Resource Slack
177(1)
9.4.6 Type 6 -- IT Application-Time Slack
178(1)
9.5 A Slack View Toward the Value of IT
178(10)
9.5.1 IT Slack and Organizational Efficiency
179(1)
9.5.1.1 Type of IT Slack and Organizational Efficiency
180(6)
9.5.2 IT Slack and Organizational Effectiveness
186(2)
9.6 Implications and Contributions
188(3)
9.7 Conclusion
191(8)
Appendix A
192(3)
References
195(4)
10 Portfolio Theory: The Contribution of Markowitz's Theory to Information System Area
199(14)
Pietro Cunha Dolci
Antonio Carlos Gastaud Macada
10.1 Introduction
200(1)
10.2 Literature Review
201(7)
10.2.1 Description of Portfolio Theory
201(1)
10.2.2 Markowitz's Theory and Information System Area
202(2)
10.2.3 Information Technology Portfolio Management (ITPM)
204(1)
10.2.3.1 Dimensions of ITPM
205(1)
10.2.3.2 IT Projects Portfolio
206(2)
10.3 Links from This Theory to Other Theories
208(1)
10.4 Concluding Comments
208(5)
References
209(4)
11 The Theory of the Lemon Markets in IS Research
213(18)
Jan Devos
Hendrik Van Landeghem
Dirk Deschoolmeester
11.1 Introduction
214(1)
11.2 Dissection of the Theory: Its Nomological Network and Constructs
215(3)
11.3 Link with Other Theories
218(2)
11.4 Literature Overview of IS Articles Using LMT
220(2)
11.5 Bibliographical Analysis of the Original Akerlof Article
222(5)
11.6 Conclusion
227(4)
References
227(4)
12 The Technology--Organization--Environment Framework
231(16)
Jeff Baker
12.1 Introduction
232(3)
12.1.1 The Technological Context
232(1)
12.1.2 The Organizational Context
233(2)
12.1.3 The Environmental Context
235(1)
12.2 The Technology--Organization--Environment Framework in Research
235(2)
12.3 The Technology--Organization--Environment Framework in Future Research
237(6)
12.3.1 Reasons for Lack of Development
237(4)
12.3.2 Future Directions for TOE Research
241(2)
12.4 Conclusions
243(4)
References
243(4)
13 Contingency Theory in Information Systems Research
247(18)
Jeff Reinking
13.1 Introduction
248(1)
13.2 Literature Review
249(9)
13.2.1 Seminal Literature
249(1)
13.2.1.1 Environment
250(1)
13.2.1.2 Technology
250(1)
13.2.1.3 Leadership Traits
251(1)
13.2.2 Contingency Research in IS
251(2)
13.2.2.1 Systems Design
253(1)
13.2.2.2 Implementation
254(1)
13.2.2.3 Performance
255(1)
13.2.2.4 User Involvement
256(1)
13.2.2.5 Internet
257(1)
13.2.2.6 Additional Constructs
258(1)
13.3 Research Methods
258(2)
13.4 Contingency Theory Limitations
260(1)
13.4.1 Performance
260(1)
13.4.2 Contingency Variables
260(1)
13.4.3 Culture
261(1)
13.5 Conclusion
261(4)
References
262(3)
14 IT and Porter's Competitive Forces Model and Strategies
265(18)
Sanjay Mohapatra
14.1 Introduction
266(1)
14.2 Understanding Porter's Model
266(3)
14.2.1 Supplier's Bargaining Power
267(1)
14.2.2 Bargaining Power of Buyers
267(1)
14.2.3 Threats of New Entrant
267(1)
14.2.4 Threat of Substitutes
268(1)
14.2.5 Threats of Rivalry Among Existing Players in Present Market
268(1)
14.3 Strategic Significance of Information Technology
269(1)
14.4 Technology-Enabled Strategy
270(1)
14.5 How Five Forces Help Formulate Strategy
271(1)
14.6 IT Research and Porter's Five Forces
272(2)
14.7 IT and Porter's Five Forces
274(3)
14.7.1 IT and Buying Power
275(1)
14.7.2 IT and Entry Barrier
275(1)
14.7.3 IT and Threat of Substitutes
275(1)
14.7.4 IT and Industry Rivalry
276(1)
14.7.5 IT and Selling Power
276(1)
14.8 Changing Times with IT
277(1)
14.9 Role of Managers in IT-Enabled Strategy
278(1)
14.10 Conclusion
279(4)
References
280(3)
15 Information Technology and Organisational Performance: Reviewing the Business Value of IT Literature
283(20)
Boumediene Ramdani
15.1 Introduction
284(2)
15.1.1 IT Assets
284(1)
15.1.2 IT Business Value
285(1)
15.1.3 IT Business Value Dimensions
286(1)
15.2 Early Research on IT Business Value
286(2)
15.3 Current Theoretical Paradigms
288(8)
15.3.1 Economics-Based IT Business Value Research
288(3)
15.3.2 Management-Based IT Business Value Research
291(1)
15.3.2.1 Value Creation Models
292(1)
15.3.2.2 Performance Measurement Models
293(1)
15.3.2.3 IT Investment Models
294(1)
15.3.2.4 IT Governance Models
295(1)
15.3.3 Sociology-Based IT Business Value Research
296(1)
15.4 Conclusion and Future Research
296(7)
References
297(6)
16 Applying "Business Case" Construct Using the "Diffusion of Innovations" Theory Framework: Empirical Case Study in the Higher Education
303(32)
Francisco Chia Cua
16.1 Introduction
304(3)
16.1.1 Critical Reflective Lenses
306(1)
16.1.2 Outline
307(1)
16.2 The "Diffusion of Innovations" (DoI) Theory
307(3)
16.2.1 Perceived Attributes of the Innovation
309(1)
16.3 Methodology
310(7)
16.3.1 Research Questions
311(1)
16.3.2 The Literature Review
311(1)
16.3.3 Units of Analysis and Limitations
311(2)
16.3.4 Replication and Challenges in Data Gathering, Analysis, and Narration, Threats to the Single-Case Study, and Control Self-assessment
313(4)
16.4 The Empirical Evidence
317(7)
16.4.1 The "Business Case" Document
318(1)
16.4.1.1 Section 1: The Evaluation Process
318(1)
16.4.1.2 Section 2: Why is a New Finance System Needed?
319(1)
16.4.1.3 Section 3: Benefits of a New Financial System
320(1)
16.4.1.4 Section 4: What is the Recommended Solution?
320(1)
16.4.1.5 Section 5: What Will Happen if a New Financial System Is Not Implemented?
320(2)
16.4.1.6 Section 6: Proposed Time Frame
322(1)
16.4.1.7 Section 7: What Resources will be Required?
322(1)
16.4.1.8 Attachment A: Project Definition (2 Pages)
322(1)
16.4.1.9 Attachment B: Project Strategic Evaluation (1 Page)
323(1)
16.4.1.10 Attachment C: Project Risk Assessments of the Four Options (4 Pages)
323(1)
16.4.1.11 Attachment D: Cost Summary (1 Page)
323(1)
16.4.1.12 Attachment E: Cost-Benefit Analysis
323(1)
16.5 Discussions
324(2)
16.6 Conclusion and Directions for Future Research
326(9)
References
327(8)
17 Punctuated Equilibrium Theory in IS Research
335(20)
Christopher T. Street
James S. Denford
17.1 Introduction
336(1)
17.2 Theory Description
336(6)
17.2.1 Theory Origins
336(1)
17.2.2 Application to Management
337(1)
17.2.3 Decomposing Punctuated Equilibrium
338(2)
17.2.4 Discussion of Theory
340(2)
17.3 Levels of Analysis, Alternative Theories, and Applications
342(2)
17.3.1 Persistent Gradualism
343(1)
17.3.2 Tectonic Shift
343(1)
17.3.3 Turbulent Adaptation
344(1)
17.4 Four Applications of Punctuated Equilibrium in IS Research
344(4)
17.4.1 Virtual Teams
346(1)
17.4.2 IS Implementation
346(1)
17.4.3 Organizational Change
347(1)
17.4.4 Strategic Alignment
347(1)
17.5 Operationalization of Punctuated Equilibrium
348(2)
17.5.1 Triggering Event: Was the Change Event-Driven?
348(1)
17.5.2 Pervasive Change: Was There a Transformation?
349(1)
17.5.3 Entire Organization: Was There an Entity-Wide Systemic Change?
349(1)
17.5.4 Short Period of Time: Was the Occurrence Rapid?
349(1)
17.6 Conclusion
350(5)
References
351(4)
18 Discrepancy Theory Models of Satisfaction in IS Research
355(28)
James J. Jiang
Gary Klein
Carol Saunders
18.1 Introduction
356(1)
18.2 Origins of Discrepancy-Based Satisfaction
357(5)
18.2.1 Discrepancy Theory Overview
358(1)
18.2.2 Management Studies of Job Satisfaction
359(1)
18.2.3 Marketing Studies of Consumer Satisfaction
360(2)
18.3 Satisfaction in IS Research
362(9)
18.3.1 User Satisfaction with Information Systems
363(4)
18.3.2 Job Satisfaction in the Information Systems Literature
367(1)
18.3.3 Discrepancy Theory Formation of Satisfaction
367(4)
18.4 Methodological Issues in Applying Discrepancy Theories
371(4)
18.4.1 Choosing the Components
371(1)
18.4.2 Measuring Discrepancy
372(2)
18.4.3 Choosing the Shape
374(1)
18.4.4 Analyzing the Relationship
374(1)
18.5 Conclusions
375(8)
References
376(7)
19 Institutional Change and Green IS: Towards Problem-Driven, Mechanism-Based Explanations
383(26)
Tom Butler
19.1 Introduction
384(2)
19.1.1 Green IT and Green IS Defined
385(1)
19.2 Institutional Theory
386(4)
19.2.1 Mechanisms-Based Explanations from Institutional and Social Movement Theory
387(1)
19.2.2 Institutional and Social Movement Theory in IS Research
388(1)
19.2.3 Evidence of Institutional and Social Mechanisms in IS Research
389(1)
19.3 Towards a Problem-Driven Explanatory Theory of Green IS
390(10)
19.3.1 Social Mechanisms Operating from the Regulative Pillar
391(2)
19.3.2 The Role of Social Mechanisms in Shaping Influences from the Normative Pillar
393(4)
19.3.3 Social Mechanisms and the Cultural-Cognitive Pillar
397(3)
19.4 Conclusions
400(9)
19.4.1 Theoretical Development and Implications
401(2)
References
403(6)
20 A Multilevel Social Network Perspective on IT Adoption
409(32)
Heidi Tscherning
20.1 Introduction
410(2)
20.2 Multilevel Research on IT Adoption
412(4)
20.2.1 Levels of Analysis: Society -- Industries -- Organizations
414(1)
20.2.2 Levels of Analysis: Industries -- Organizations
414(1)
20.2.3 Levels of Analysis: Organizations -- Groups/Teams
415(1)
20.2.4 Levels of Analysis: Groups -- Individuals
415(1)
20.2.5 Levels of Analysis: Organizations -- Individuals
415(1)
20.3 Multilevel Framework for Technology Adoption
416(7)
20.3.1 Individual Level
418(1)
20.3.1.1 Attributes and Beliefs
419(1)
20.3.1.2 Intentions
419(1)
20.3.1.3 Adoption Behavior
420(1)
20.3.2 Network Level
420(1)
20.3.2.1 Discourse
420(1)
20.3.2.2 Diffusion
421(1)
20.3.3 Individual Level and Network Level Interaction
422(1)
20.4 Social Network Theories
423(6)
20.4.1 Social Network Analysis
423(2)
20.4.2 Homophily
425(1)
20.4.3 Self-Interest and Collective Action
426(2)
20.4.4 Contagion
428(1)
20.5 Discussion
429(3)
20.5.1 Homophily
430(1)
20.5.2 Self-Interest and Collective Action
431(1)
20.5.3 Contagion
432(1)
20.5.4 Social Network Analysis
432(1)
20.6 Limitations and Future Research
432(1)
20.7 Conclusion
433(8)
References
434(7)
21 Expectation--Confirmation Theory in Information System Research: A Review and Analysis
441(30)
Mohammad Alamgir Hossain
Mohammed Quaddus
21.1 Introduction
442(1)
21.2 A Review of ECT and ECM
443(8)
21.2.1 The Expectation--Confirmation Theory (ECT)
443(2)
21.2.2 The Evolution of Expectation--Confirmation Model (ECM)
445(1)
21.2.3 The Anomalies of ECT and ECM
446(1)
21.2.3.1 Definition Anomaly
447(2)
21.2.3.2 Relationship Anomaly
449(1)
21.2.3.3 Measurement Anomaly
449(1)
21.2.3.4 Additional Variables
450(1)
21.2.3.5 Other Limitations
451(1)
21.3 Literature Analyses
451(12)
21.3.1 Research Methodology
451(1)
21.3.2 Results and Findings
452(1)
21.3.2.1 Research Type Used
452(1)
21.3.2.2 Research Concentration
452(1)
21.3.2.3 Relevant Theories Used
452(10)
21.3.2.4 Dependent Variables
462(1)
21.3.2.5 Independent Variables
462(1)
21.3.2.6 Other Findings
462(1)
21.4 Promising Inquiry for the Future
463(1)
21.5 Conclusions
464(7)
References
465(6)
22 Stakeholder Theory and Applications in Information Systems
471(18)
Alok Mishra
Yogesh K. Dwivedi
22.1 Introduction
472(1)
22.2 Stakeholder Theories of Management
473(2)
22.2.1 Origin of Stakeholder Theory
473(1)
22.2.2 Descriptive, Instrumental and Normative Views of Stakeholder Theory
474(1)
22.3 Stakeholder Theories in Information Systems
475(3)
22.4 Applications of Stakeholder Theory in Information Systems
478(1)
22.5 Discussion
478(7)
22.6 Conclusions
485(4)
References
485(4)
About the Author 489(10)
Index 499