Atjaunināt sīkdatņu piekrišanu

Information Systems Theory: Explaining and Predicting Our Digital Society, Vol. 2 2012 [Hardback]

  • Formāts: Hardback, 446 pages, height x width: 235x155 mm, weight: 869 g, XXVI, 446 p., 1 Hardback
  • Sērija : Integrated Series in Information Systems 29
  • Izdošanas datums: 20-Sep-2011
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1441997067
  • ISBN-13: 9781441997067
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 136,16 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 160,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 446 pages, height x width: 235x155 mm, weight: 869 g, XXVI, 446 p., 1 Hardback
  • Sērija : Integrated Series in Information Systems 29
  • Izdošanas datums: 20-Sep-2011
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1441997067
  • ISBN-13: 9781441997067
Citas grāmatas par šo tēmu:
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives:





To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model. To discuss how a theory can be used to better understand how information systems can be effectively deployed in todays digital world.  

This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections.

The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, PortfolioTheory, Discrepancy Theory Models, and eleven others.

The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others.   The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others.

Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.
1 Employing Personal Construct Theory to Understand Information Systems: A Practical Guide for Researchers
1(24)
M. Gordon Hunter
Peter Caputi
Felix B. Tan
1.1 Introduction
2(1)
1.2 Personal Construct Theory
2(2)
1.3 The Repertory Grid Technique
4(9)
1.3.1 Initial Project Decisions
4(1)
1.3.2 Nominate Elements
5(2)
1.3.3 Document and Explain Constructs
7(2)
1.3.4 Relate Elements and Constructs
9(1)
1.3.5 Analysis
10(1)
1.3.5.1 Qualitative
10(1)
1.3.5.2 Quantitative
11(2)
1.4 Examples
13(6)
1.4.1 Example One: Systems Analysts
13(1)
1.4.1.1 Research Objective
13(1)
1.4.1.2 Elements
14(1)
1.4.1.3 Constructs
14(2)
1.4.1.4 Analysis
16(1)
1.4.1.5 Findings
16(1)
1.4.1.6 Contribution
16(1)
1.4.2 Example Two: Project Managers
16(1)
1.4.2.1 Research Objective
17(1)
1.4.2.2 Elements
17(1)
1.4.2.3 Constructs
17(1)
1.4.2.4 Analysis
18(1)
1.4.2.5 Findings
19(1)
1.4.2.6 Contribution
19(1)
1.5 Conclusions
19(2)
1.6 Appendix A
21(1)
References
21(4)
2 Psychological Ownership and the Individual Appropriation of Technology
25(16)
James Gaskin
Kalle Lyytinen
2.1 Introduction
26(1)
2.2 Literature Review
27(4)
2.2.1 Possession and Ownership
27(2)
2.2.2 Appropriation
29(2)
2.3 Discussion
31(4)
2.3.1 Antecedents
31(2)
2.3.2 Consequences
33(2)
2.4 Limitations and Future Research
35(2)
2.5 Conclusion
37(1)
References
37(4)
3 Transactive Memory and Its Application in IS Research
41(18)
Dorit Nevo
Ron Ophir
3.1 Introduction
41(1)
3.2 Research on Transactive Memory
42(4)
3.2.1 Transactive Memory in Groups
42(2)
3.2.2 Transactive Memory in IS Research
44(1)
3.2.2.1 TMS in Development Projects Teams
44(1)
3.2.2.2 TMS Development in Virtual Teams
45(1)
3.2.2.3 Technology Support for TMS
45(1)
3.3 Applying Transactive Memory in IS Research
46(8)
3.3.1 Measuring Transactive Memory
46(1)
3.3.1.1 Behavioral Coding
46(1)
3.3.1.2 TM Scales
47(1)
3.3.1.3 Other Measures
48(2)
3.3.2 Nomological Network
50(2)
3.3.3 Future Research Areas
52(2)
3.4 Conclusion
54(1)
References
55(4)
4 The Language-Action Approach: Information Systems Supporting Social Actions
59(12)
Karthikeyan Umapathy
4.1 Introduction
60(1)
4.2 Theoretical Foundations of LAP
60(3)
4.2.1 The Theory of Communicative Action
61(2)
4.3 Difference Between Traditional and LAP Views of Information Systems
63(1)
4.4 Criticisms of LAP and Theory of Communicative Action
64(2)
4.5 Review of Exemplar Information Systems Research Articles
66(1)
4.6 Discussion
67(1)
References
68(3)
5 A Summary and Review of Galbraith's Organizational Information Processing Theory
71(24)
Clemens Haußmann
Yogesh K. Dwivedi
Krishna Venkitachalam
Michael D. Williams
5.1 Introduction
72(1)
5.2 An Overview of Galbraith's Organizational Information Processing Theory (OIPT)
72(7)
5.2.1 The Theoretical Foundation: Contingency Theory
73(1)
5.2.2 The Organizational Basis for Developing the Theory: The Mechanistic Model
74(2)
5.2.2.1 Creation of Slack Resources
76(1)
5.2.2.2 Creation of Self-Contained Tasks
76(1)
5.2.2.3 Investment in Vertical Information Systems
76(2)
5.2.2.4 Creation of Lateral Relations
78(1)
5.3 Limitations of the Organizational Information Processing Theory
79(2)
5.4 Theoretical Advancements
81(4)
5.4.1 Information Processing Theory and Equivocality
81(2)
5.4.2 Information Processing Theory and Social Cognition
83(2)
5.5 Organizational Information Processing Theory in Practice
85(3)
5.5.1 Information Systems Architecture
85(1)
5.5.2 Organizational Structure and ERP
86(1)
5.5.3 External Technology Integration
87(1)
5.6 Recommendations
88(2)
5.7 Conclusion
90(2)
References
92(3)
6 Scientia potentia est: Organizational Learning, Absorptive Capacity and the Power of Knowledge
95(22)
Kimberly A. Zahller
6.1 Introduction
96(1)
6.2 Explaining the Learning Process: Organizational Learning
97(6)
6.2.1 Description of the Model
97(1)
6.2.2 Antecedents
98(1)
6.2.3 Constructs
99(3)
6.2.4 Mediators and Moderators
102(1)
6.2.5 Outcomes
102(1)
6.3 Differentiating Learning Capabilities: Absorptive Capacity
103(6)
6.3.1 Description of the Model
103(2)
6.3.2 Antecedents
105(1)
6.3.3 Constructs
105(2)
6.3.4 Mediators and Moderators
107(1)
6.3.5 Outcomes
108(1)
6.4 Comparison of Organizational Learning and Absorptive Capacity
109(1)
6.5 Measurement Issues
110(1)
6.6 Discussion
111(2)
References
113(4)
7 Applying Actor Network Theory and Managing Controversy
117(14)
Amany Elbanna
7.1 Background
117(1)
7.2 Key ANT Propositions
118(2)
7.2.1 Network Building
118(1)
7.2.2 Performance of Power
119(1)
7.2.3 The Global/Local Relationship
120(1)
7.3 The Application of ANT in IS Research
120(4)
7.4 Managing Controversy
124(2)
7.4.1 Social Network Not Actor Network
125(1)
7.4.2 The Problem of Contingency
125(1)
7.4.3 Where Is the Translation?
125(1)
7.5 Final Remark on the Application of ANT
126(1)
References
126(5)
8 Using Concepts from Structuration Theory and Consequence of Modernity to Understand IS Deployment in Health-Care Setting
131(12)
Urvashi Sharma
Julie Barnett
Malcolm Clarke
8.1 Introduction
131(5)
8.1.1 Telehealth and Information Systems
132(1)
8.1.2 Structuration Theory
133(1)
8.1.2.1 Application of ST in IS Literature
134(1)
8.1.2.2 Limitations of Structuration Theory to Study IS Deployment
135(1)
8.2 Use of Specific Concepts from ST and CM to Study IS Deployment: The Telehealth Story
136(4)
8.2.1 Change and Social System: Macro Perspective
137(2)
8.2.2 Change and Human Agent: Micro Perspective
139(1)
8.3 Conclusion
140(1)
References
140(3)
9 Hubble Bubble Toil and Trouble: The Special Case of Emergency Services
143(16)
Dr. Polly Sobreperez
9.1 Introduction
143(1)
9.2 Social Shaping of Technology Theoretical Background
144(3)
9.2.1 Relevant Social Groups
144(1)
9.2.1.1 Review of Technological Frames Theory
145(1)
9.2.2 Differing Attitudes to Data Collection and Usage
146(1)
9.3 Emergency Services
147(3)
9.3.1 Emergency Situations
147(1)
9.3.2 Emergency Decision Making
148(1)
9.3.3 Accountability and Information Recording
149(1)
9.4 Emergency Workers
150(3)
9.4.1 Emergency Workers and Technological Frames
151(1)
9.4.2 Relevant Social Groups and Frame Dimensions
152(1)
9.4.3 Emergency Incidents and Technology
152(1)
9.5 Technological Bubbles
153(1)
9.6 Conclusion
154(1)
References
155(4)
10 ERP Diffusion and Assimilation Using IT-Innovation Framework
159(26)
Husam Abu-Khadra
Khalifeh Ziadat
10.1 Introduction
160(1)
10.2 IT-Assimilation and IT-Diffusion Theories
161(10)
10.2.1 Diffusion of Innovation Theory (DOI)
162(2)
10.2.2 Technology--Organization--Environment (TOE) Framework
164(2)
10.2.3 Technology Acceptance Model (TAM)
166(3)
10.2.4 Consumer Acceptance Technology (CAT) Model
169(1)
10.2.5 Technology Readiness
169(1)
10.2.6 Delone and Mclean Information Systems Success Model
170(1)
10.3 Hybrid Diffusion Framework
171(8)
10.3.1 Procedures and List of Potential Determinants Along with the Clusters
171(1)
10.3.2 Proposed Factors Within the Three-Cluster Context
172(1)
10.3.2.1 The Impact of External Environment Characteristics
172(3)
10.3.2.2 The Effects of Internal "Organizational" Environment Characteristics
175(2)
10.3.2.3 Technology Characteristics
177(2)
10.4 Conclusions, Limitations, and Further Research
179(1)
References
180(5)
11 The Yield Shift Theory of Satisfaction and Its Application to the IS/IT Domain
185(34)
Robert O. Briggs
Bruce A. Reinig
Gert-Jan de Vreede
11.1 Introduction
186(1)
11.2 Satisfaction Effects
187(2)
11.3 Summary of IS/IT Satisfaction Perspectives
189(4)
11.3.1 Measurement Perspectives
189(1)
11.3.2 Attribute Perspectives
190(1)
11.3.3 Goal Attainment Perspectives
190(1)
11.3.4 Confirmation Perspectives
191(1)
11.3.5 Disconfirmation Perspectives
191(1)
11.3.6 Aggregated Models
192(1)
11.3.7 The Need for a New Perspective
192(1)
11.4 Yield Shift Theory
193(9)
11.4.1 Definitions of Satisfaction
194(1)
11.4.1.1 Satisfaction-as-Judgment
194(1)
11.4.1.2 Satisfaction-as-Affect
195(1)
11.4.1.3 Mixed Definitions
195(1)
11.4.2 Definition of the Satisfaction Response for YST
195(1)
11.4.3 The Assumptions and Propositions of YST
196(1)
11.4.3.1 Yield Assessment for a Given Goal
196(3)
11.4.3.2 Contrasting Proposition 1 with Other Moderated Cognitive Relationships
199(1)
11.4.3.3 Shifts in Perceived Yield for the Active Goal Set
199(3)
11.5 Evaluating YST
202(8)
11.5.1 Falsifiability of YST Constructs
203(2)
11.5.2 The Falsifiability of YST Propositions
205(1)
11.5.3 The Scientific Utility of YST
205(1)
11.5.3.1 Goal Attainment Effects and YST
206(1)
11.5.3.2 Confirmation Effect and YST
206(1)
11.5.3.3 Disconfirmation Effect and YST
207(1)
11.5.3.4 Anticipation Effect and YST
207(1)
11.5.3.5 Nostalgia Effect and YST
207(1)
11.5.3.6 Differential Effects and YST
208(1)
11.5.3.7 Hygiene Effects and YST
208(1)
11.5.3.8 Mentor Effects and YST
209(1)
11.5.3.9 Mixed Feelings and YST
209(1)
11.5.3.10 Attenuation Effects and YST
209(1)
11.5.4 YST and the Paradoxes of Earlier Perspectives
210(1)
11.6 Discussion
210(3)
11.6.1 YST and the Technological Imperative
211(1)
11.6.2 Future Directions
211(1)
11.6.3 The Boundaries of YST
212(1)
11.7 Conclusions
213(1)
11.8 Appendix A
214(1)
11.8.1 A Satisfaction Instrument for IS/IT Artifacts
214(1)
References
214(5)
12 Intention-Based Models: The Theory of Planned Behavior Within the Context of IS
219(22)
Enas Al-Lozi
Anastasia Papazafeiropoulou
12.1 Introduction
220(1)
12.2 Intention-Based Models
220(5)
12.2.1 Origin of Theory of Planned Behavior
220(1)
12.2.2 Theory of Planned Behavior: Overview
221(1)
12.2.2.1 The Conceptual Model
222(2)
12.2.2.2 Dimensions and Measurements of Theory of Planned Behavior
224(1)
12.3 Applications of Theory of Planned Behavior
225(7)
12.3.1 Applications of Theory of Planned Behavior Within the IS
225(7)
12.4 A Proposed Example of TPB Application in IS
232(2)
12.5 Conclusions
234(1)
References
235(6)
13 Understanding IS Theory: An Interpretation of Key IS Theoretical Frameworks Using Social Cognitive Theory
241(40)
Kevin Carillo
13.1 Introduction
242(2)
13.2 Social Cognitive Theory: An Overview
244(3)
13.2.1 Social Cognitive Theory in IS Research
245(2)
13.3 Research Method and Data Analysis
247(2)
13.4 Results
249(5)
13.4.1 Construct-Level Results
249(2)
13.4.2 Theory-Level Results
251(3)
13.5 Discussion and Future Research
254(8)
13.5.1 Self-Efficacy Theory Versus Social Cognitive Theory
254(1)
13.5.2 Inter-influence Between Self-Beliefs and Expected Outcomes
255(1)
13.5.3 Potential of Self-Regulation Mechanisms
256(1)
13.5.4 Observational Learning and Social Modeling
256(1)
13.5.5 Lack of Emotional Considerations
257(1)
13.5.6 Behavior as a Temporal Process
257(1)
13.5.7 Human Agency and Triadic Reciprocality
258(1)
13.5.8 Dependent Variables and Unexplored Interactions
259(3)
13.6 Conclusion
262(1)
13.7 Appendix A: Results of the Article Review
263(11)
13.8 Appendix B: Definition of the Constructs in the Reviewed IS Theoretical Models
274(2)
References
276(5)
14 The Potential of Critical Realism in IS Research
281(24)
Sven A. Carlsson
14.1 Introduction
282(1)
14.2 Why Critical Realism?
283(2)
14.3 Critical Realism
285(2)
14.4 Using Critical Realism in IS Research
287(12)
14.4.1 CR-Based Development of IS Theories
287(1)
14.4.1.1 A CR-Based Theory of Technology-Enabled Organizational Change
288(1)
14.4.1.2 Explaining SISP Outcomes Using a CR
289(2)
14.4.2 CR-Based Information Systems Evaluation Research
291(2)
14.4.2.1 Enterprise Systems Implementation Evaluation
293(1)
14.4.2.2 A Realistic Evaluation of the Impact of a Computer-Based IS on Clinical Practice
294(1)
14.4.3 CR-Based Information Systems Design Science
295(1)
14.4.3.1 Research Activity: Identify Problem Situations and Desired Outcomes
296(1)
14.4.3.2 Research Activity: Review (Kernel) Theories and Previous Research
296(1)
14.4.3.3 Research Activity: Propose/Refine Design Theory
297(1)
14.4.3.4 Research Activity: Test Design Theory
297(1)
14.4.3.5 An Example of How to Develop IS Design Theories and Design Knowledge
298(1)
14.5 Conclusions and Discussion
299(2)
References
301(4)
15 Grounded Theory and Information Systems: Are We Missing the Point?
305(18)
Hans Lehmann
15.1 Introduction
306(1)
15.2 A Brief Overview of GTM
307(1)
15.3 `Right' for Information Systems Research?
308(2)
15.3.1 GTM for Organisational Cases?
309(1)
15.3.2 What is GTM's Paradigmatic Position?
309(1)
15.4 The `Right' GTM?
310(5)
15.4.1 What is Not Specific to GTM
311(1)
15.4.2 Specifics of GTM
312(1)
15.4.2.1 The Rigour of GTM
312(2)
15.4.2.2 Perception Versus Conception: GTM's Unit of Analysis
314(1)
15.5 The Nature of Concepts: A Brief History
315(4)
15.6 Re-stating the GTM Analysis Regime
319(1)
15.7 Conclusion
320(1)
References
321(2)
16 Developing Theories in Information Systems Research: The Grounded Theory Method Applied
323(26)
Benjamin Muller
Sebastian Olbrich
16.1 Introduction
324(2)
16.2 The Background of the Grounded Theory Method
326(1)
16.3 Applying the Grounded Theory Method in IS Research
327(4)
16.3.1 Opportunities of the Grounded Theory Method in IS Research
327(2)
16.3.2 Issues and Challenges in Applying GTM
329(1)
16.3.3 Awareness of Researchers Using the Grounded Theory Method
330(1)
16.4 The Process of Building Grounded Theories in IS Research
331(6)
16.4.1 Starting Grounded Research
332(1)
16.4.2 Data Collection
332(1)
16.4.3 Coding and Extracting Categories
333(2)
16.4.4 Generating Additional Data
335(1)
16.4.5 Building the Grounded Theory
336(1)
16.5 The Grounded Theory Method Applied to IS Research
337(2)
16.6 Discussion and Outlook
339(2)
16.7 Final Remarks and Conclusions
341(1)
References
342(7)
17 Conducting Information Systems Research Using Narrative Inquiry
349(18)
M. Gordon Hunter
17.1 Introduction
350(1)
17.2 Qualitative Research Perspectives
350(1)
17.3 Grounded Theory
351(2)
17.4 Narrative Inquiry
353(1)
17.5 The Long Interview Technique
354(1)
17.6 Discussion
355(3)
17.6.1 Voluntary Turnover of Information Systems Professionals
355(1)
17.6.2 Information Systems and Small Business
356(1)
17.6.3 The Changing Role of Chief Information Officers
357(1)
17.7 Conclusions
358(4)
Appendix A Information Systems and Small Business
359(1)
A.1 Interview Protocol
359(2)
Appendix B The Changing Role of Chief Information Officers
361(1)
B.1 Interview Protocol
361(1)
References
362(5)
18 The Mikropolis Model: A Framework for Transdisciplinary Research of Information Systems in Society
367(20)
Jan-Hendrik Wahoff
Joao Porto de Albuquerque
Arno Rolf
18.1 Introduction
368(1)
18.2 Problem-Oriented Research and Trandisciplinarity
369(3)
18.2.1 The Nature of Problem-Oriented Research
369(1)
18.2.2 Problem-Oriented Research and Societal Problems
370(1)
18.2.3 Inter- and Transdisciplinarity
370(1)
18.2.4 Transdisciplinarity and ISR
371(1)
18.3 The Mikropolis Model
372(6)
18.3.1 Background
372(1)
18.3.2 Interactions
373(1)
18.3.3 Structural Elements
374(1)
18.3.3.1 The Socio-Technical Core
374(2)
18.3.3.2 Micro-Context
376(1)
18.3.3.3 The Macro-Context
377(1)
18.3.4 The Temporal Perspective
377(1)
18.3.5 Summary of the Main Concepts of the Model
378(1)
18.4 Transdisciplinary Research with the Mikropolis Model
378(5)
18.4.1 Previous Research with the Mikropolis Model
379(1)
18.4.2 Exemplary Case Study
380(2)
18.4.3 Discussion of the Case Study
382(1)
18.5 Present and Future Research
383(1)
18.6 Concluding Remarks
384(1)
References
384(3)
19 Inquiring Systems: Theoretical Foundations for Current and Future Information Systems
387(10)
James L. Parrish, Jr.
James F. Courtney
19.1 Introduction
388(1)
19.2 The Impact of Inquiring Systems on Contemporary Information Systems
388(7)
19.2.1 The Liebnizian Inquirer
389(1)
19.2.2 The Lockean Inquirer
390(1)
19.2.3 The Kantian Inquirer
390(1)
19.2.4 The Hegelian Inquirer
391(1)
19.2.5 The Singerian Inquirer
392(3)
19.3 Conclusion and Future Research
395(1)
References
395(2)
20 Information Systems Deployment as an Activity System
397(16)
Faraja Igira
20.1 Introduction
398(1)
20.2 Cultural Historical Activity Theory (CHAT)
399(4)
20.2.1 Developmental Work Research (DWR)
401(2)
20.3 How to Use DWR in IS Research
403(4)
20.4 DWR in Relation to Other Methodologies Used in IS Research
407(1)
20.5 Conclusion and Future Research
408(1)
References
409(4)
21 The Work System Method as an Approach for Teaching and Researching Information Systems
413(12)
Doncho Petkov
Olga Petkova
Kosheek Sewchurran
Theo Andrew
Ram Misra
21.1 Introduction
414(1)
21.2 Introduction to the Work System Method and Related Current Research
414(3)
21.3 Discussion, WSM Evaluation, and Extensions of WSM Research
417(4)
21.4 Conclusion and Possible Future Research on WSM Applied to IS Education and IS Development
421(1)
References
422(3)
About the Contributors (Volume 2) 425(10)
Index 435