Brian Mennecke | Iowa State University (original) (raw)
Papers by Brian Mennecke
Management Research Review, 2014
ABSTRACT Purpose ‐ This article revisits Nicolas Carr's popular Harvard Review article IT... more ABSTRACT Purpose ‐ This article revisits Nicolas Carr's popular Harvard Review article IT Doesn't Matter on its ten-year anniversary. The purpose is to analyze Carr's argument by analyzing the development of the argument itself as opposed to finding exceptions to the argument, which has been done in the past. Design/methodology/approach ‐ The authors use co-evolutionary theory as a case against Carr's argument by showing that Carr has only looked at the growth of IT from a population ecology perspective and has failed to anticipate the adaptive nature of IT within the organization. Findings ‐ The authors show that Carr's new rules for IT management may not be applicable if viewed through the lens of the three principles of self-renewing organizations espoused by co-evolutionary theory. Research limitations/implications ‐ The authors provide a new basis for evaluating the strategic nature of IT and offer a background for future research and case studies into evaluating IT strategic competitive advantage within the organization. Practical implications ‐ The research provides guidelines for organizations to better decide how to strategically implement IT to more fully utilize its capabilities. Originality/value ‐ The paper provides a new method for refuting a popular article by attacking the argument as opposed to finding exceptions to the argument. This is valuable to those who wish to evangelize the strategic capacity of IT within the organization.
Lecture Notes in Computer Science, 1997
We present a distributed geographic information system (DGIS) built on a distributed high perform... more We present a distributed geographic information system (DGIS) built on a distributed high performance computing environment using a number of software infrastructural building blocks and computational resources interconnected by an ATM-based broadband network. Archiving, access and processing of scienti c data are discussed in the context of geographic and environmental applications with special emphasis on the potential for local-area weather, agriculture, soil and land management products. Software technologies such as tiling and caching techniques can be used to optimise storage requirements and response time for applications requiring very large data sets such as multi-channel satellite data. Distributed High Performance Computing hardware technology underpins our proposed system. In particular, we discuss the capabilities of a distributed hardware environment incorporating: high bandwidth communications networks such as Telstra's Experimental Broadband Network (EBN); large capacity hierarchical storage systems; and high performance parallel computing resources.
Proceedings of the 2013 conference on Computer supported cooperative work companion - CSCW '13, 2013
Lecture Notes in Computer Science, 2013
ABSTRACT This paper reports on research designed to examine the role of embedded videos in digita... more ABSTRACT This paper reports on research designed to examine the role of embedded videos in digital menu boards and it's influence on consumer decision-making. The study's results showed that the embedded videos caught the attention of decision makers and healthy food images have an effect on choice; however, these variables do not interact. The results for the main effects show that technology can aid decision-making during the information search and purchase/choice stages.
Information Systems and e-Business Management, 2014
This study investigates how consumers assess the quality of two types of recommender systems-coll... more This study investigates how consumers assess the quality of two types of recommender systems-collaborative filtering and content-based-in the context of e-commerce by using a modified version of the unified theory of acceptance and use of technology (UTAUT) model. Specifically, the concept of trust in the technological artifact is adapted to examine the intention to use recommender systems. Additionally, this study also considers hedonic and utilitarian product characteristics with the goal of presenting a comprehensive picture on recommender systems literature. This study utilized a 2 9 2 crossover within-subjects experimental design involving a total of 80 participants, who all evaluated each recommender system. The results suggest that the type of recommender system significantly moderates many relationships of the determinants of customer behavioral intent on behavioral intention to use recommender systems. Surprisingly, the type of product does not moderate any relationship on behavioral intention. This study holds importance in explaining the factors contributing to the use of recommender systems and understanding the relative influence of the two types of recommender systems on customer behavioral intention to use recommender systems. The finding also sheds light for designers on how to provide more effective recommender systems.
2013 46th Hawaii International Conference on System Sciences, 2013
The nature of the training experience a person is exposed to is an important contextual element i... more The nature of the training experience a person is exposed to is an important contextual element influencing technology acceptance, but little research has explored the differences in technology acceptance for different types of training experiences. This research investigates the difference in technology acceptance for individuals experiencing different types of training. Our work builds on prior research by Venkatesh, Bandura, and others examining the technology acceptance model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT), and self-efficacy and this paper is focused on addressing several remaining questions raised by this research stream. Specifically, our research addresses the nature of training and user acceptance and our findings show that individuals who are exposed to vicarious experience training differ on many dimensions with regard to technology acceptance when compared to individuals experiencing direct, hands-on training.
The Immersive Internet, 2013
Journal of Information Systems, 2013
MIS Quarterly, 2000
... Martin D. Crossland Computer Information Systems Department Southwest Missouri State Universi... more ... Martin D. Crossland Computer Information Systems Department Southwest Missouri State University Springfield, MO 65804 USA MartinCrossland@smsu.edu ... a user's spatial orientation skills were related to outcomes. Finally, Crossland et al. ...
Computers in Human Behavior, 2014
Members of virtual teams often collaborate within and across institutional boundaries. This resea... more Members of virtual teams often collaborate within and across institutional boundaries. This research investigates the effects of boundary spanning conditions on the development of team trust and team satisfaction. Two hundred and eighty-two participants carried out a collaborative design task over several weeks in a virtual world, Second Life. Multigroup structural equation modeling was used to examine our research model, which compares individual level measurement between two boundary spanning team conditions. The results indicate that trusting beliefs have a positive impact on team trust, which in turn, influences team satisfaction. Further, we found that, compared to cross-boundary teams, within-boundary teams exhibited not only higher trusting beliefs and higher satisfaction with the collaboration process but also a stronger relationship between team trust and team satisfaction. These results suggest that trust and group theories need to be interpreted in light of institutional affiliation and contextual variables. An important practical implication is that trust can be fostered in a virtual world environment and collaboration on complex tasks can be carried out effectively in virtual worlds. However, within-boundary virtual teams are preferred over cross-boundary virtual teams if satisfaction with the collaboration process is of the highest priority.
Computers in Human Behavior, 2014
ABSTRACT During the last decade, online social networks such as Facebook(TM) (Facebook) grew rapi... more ABSTRACT During the last decade, online social networks such as Facebook(TM) (Facebook) grew rapidly in popularity and this was due in no small measure to use of these media by adolescents. For many teenagers and young adults, Facebook represents a social institution that can be used by adolescents not only for sharing basic information and for connecting with others, but also as a platform for exploring and divulging information about their identities. To examine issues related to questions about the formation and disclosure of identity-related information by late adolescents, this study investigates the relationship between disclosures of intimate information by late adolescents through Facebook and their stage of psychosocial development. To examine disclosure behaviors of young college students on Facebook, we conducted focus groups in conjunction with a content analysis of Facebook profiles. Findings point to an extended adolescence period resting on the identity construction dilemma posed by digital social networks.
Business Horizons, 2014
ABSTRACT In this Executive Digest, we review and extend our original Business Horizons article (M... more ABSTRACT In this Executive Digest, we review and extend our original Business Horizons article (May 2013) addressing marketing avatars (i.e., mavatars1): digital embodied, biometric profiles. In the original article we offered our marketing avatar framework, which classified existing and predicted types of mavatar applications according to data collection and application domains. However, because of the quick pace of change in this domain, we must review newly introduced mavatar applications that complete the original framework. These new applications—as well as industry and regulatory actions—paint a picture of where and how mavatars will be used, and where opportunities exist for application development. For that reason, we discuss current applications and additional predictions for future use.
Skip to main content: ...
Management Research Review, 2014
ABSTRACT Purpose ‐ This article revisits Nicolas Carr's popular Harvard Review article IT... more ABSTRACT Purpose ‐ This article revisits Nicolas Carr's popular Harvard Review article IT Doesn't Matter on its ten-year anniversary. The purpose is to analyze Carr's argument by analyzing the development of the argument itself as opposed to finding exceptions to the argument, which has been done in the past. Design/methodology/approach ‐ The authors use co-evolutionary theory as a case against Carr's argument by showing that Carr has only looked at the growth of IT from a population ecology perspective and has failed to anticipate the adaptive nature of IT within the organization. Findings ‐ The authors show that Carr's new rules for IT management may not be applicable if viewed through the lens of the three principles of self-renewing organizations espoused by co-evolutionary theory. Research limitations/implications ‐ The authors provide a new basis for evaluating the strategic nature of IT and offer a background for future research and case studies into evaluating IT strategic competitive advantage within the organization. Practical implications ‐ The research provides guidelines for organizations to better decide how to strategically implement IT to more fully utilize its capabilities. Originality/value ‐ The paper provides a new method for refuting a popular article by attacking the argument as opposed to finding exceptions to the argument. This is valuable to those who wish to evangelize the strategic capacity of IT within the organization.
Lecture Notes in Computer Science, 1997
We present a distributed geographic information system (DGIS) built on a distributed high perform... more We present a distributed geographic information system (DGIS) built on a distributed high performance computing environment using a number of software infrastructural building blocks and computational resources interconnected by an ATM-based broadband network. Archiving, access and processing of scienti c data are discussed in the context of geographic and environmental applications with special emphasis on the potential for local-area weather, agriculture, soil and land management products. Software technologies such as tiling and caching techniques can be used to optimise storage requirements and response time for applications requiring very large data sets such as multi-channel satellite data. Distributed High Performance Computing hardware technology underpins our proposed system. In particular, we discuss the capabilities of a distributed hardware environment incorporating: high bandwidth communications networks such as Telstra's Experimental Broadband Network (EBN); large capacity hierarchical storage systems; and high performance parallel computing resources.
Proceedings of the 2013 conference on Computer supported cooperative work companion - CSCW '13, 2013
Lecture Notes in Computer Science, 2013
ABSTRACT This paper reports on research designed to examine the role of embedded videos in digita... more ABSTRACT This paper reports on research designed to examine the role of embedded videos in digital menu boards and it's influence on consumer decision-making. The study's results showed that the embedded videos caught the attention of decision makers and healthy food images have an effect on choice; however, these variables do not interact. The results for the main effects show that technology can aid decision-making during the information search and purchase/choice stages.
Information Systems and e-Business Management, 2014
This study investigates how consumers assess the quality of two types of recommender systems-coll... more This study investigates how consumers assess the quality of two types of recommender systems-collaborative filtering and content-based-in the context of e-commerce by using a modified version of the unified theory of acceptance and use of technology (UTAUT) model. Specifically, the concept of trust in the technological artifact is adapted to examine the intention to use recommender systems. Additionally, this study also considers hedonic and utilitarian product characteristics with the goal of presenting a comprehensive picture on recommender systems literature. This study utilized a 2 9 2 crossover within-subjects experimental design involving a total of 80 participants, who all evaluated each recommender system. The results suggest that the type of recommender system significantly moderates many relationships of the determinants of customer behavioral intent on behavioral intention to use recommender systems. Surprisingly, the type of product does not moderate any relationship on behavioral intention. This study holds importance in explaining the factors contributing to the use of recommender systems and understanding the relative influence of the two types of recommender systems on customer behavioral intention to use recommender systems. The finding also sheds light for designers on how to provide more effective recommender systems.
2013 46th Hawaii International Conference on System Sciences, 2013
The nature of the training experience a person is exposed to is an important contextual element i... more The nature of the training experience a person is exposed to is an important contextual element influencing technology acceptance, but little research has explored the differences in technology acceptance for different types of training experiences. This research investigates the difference in technology acceptance for individuals experiencing different types of training. Our work builds on prior research by Venkatesh, Bandura, and others examining the technology acceptance model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT), and self-efficacy and this paper is focused on addressing several remaining questions raised by this research stream. Specifically, our research addresses the nature of training and user acceptance and our findings show that individuals who are exposed to vicarious experience training differ on many dimensions with regard to technology acceptance when compared to individuals experiencing direct, hands-on training.
The Immersive Internet, 2013
Journal of Information Systems, 2013
MIS Quarterly, 2000
... Martin D. Crossland Computer Information Systems Department Southwest Missouri State Universi... more ... Martin D. Crossland Computer Information Systems Department Southwest Missouri State University Springfield, MO 65804 USA MartinCrossland@smsu.edu ... a user's spatial orientation skills were related to outcomes. Finally, Crossland et al. ...
Computers in Human Behavior, 2014
Members of virtual teams often collaborate within and across institutional boundaries. This resea... more Members of virtual teams often collaborate within and across institutional boundaries. This research investigates the effects of boundary spanning conditions on the development of team trust and team satisfaction. Two hundred and eighty-two participants carried out a collaborative design task over several weeks in a virtual world, Second Life. Multigroup structural equation modeling was used to examine our research model, which compares individual level measurement between two boundary spanning team conditions. The results indicate that trusting beliefs have a positive impact on team trust, which in turn, influences team satisfaction. Further, we found that, compared to cross-boundary teams, within-boundary teams exhibited not only higher trusting beliefs and higher satisfaction with the collaboration process but also a stronger relationship between team trust and team satisfaction. These results suggest that trust and group theories need to be interpreted in light of institutional affiliation and contextual variables. An important practical implication is that trust can be fostered in a virtual world environment and collaboration on complex tasks can be carried out effectively in virtual worlds. However, within-boundary virtual teams are preferred over cross-boundary virtual teams if satisfaction with the collaboration process is of the highest priority.
Computers in Human Behavior, 2014
ABSTRACT During the last decade, online social networks such as Facebook(TM) (Facebook) grew rapi... more ABSTRACT During the last decade, online social networks such as Facebook(TM) (Facebook) grew rapidly in popularity and this was due in no small measure to use of these media by adolescents. For many teenagers and young adults, Facebook represents a social institution that can be used by adolescents not only for sharing basic information and for connecting with others, but also as a platform for exploring and divulging information about their identities. To examine issues related to questions about the formation and disclosure of identity-related information by late adolescents, this study investigates the relationship between disclosures of intimate information by late adolescents through Facebook and their stage of psychosocial development. To examine disclosure behaviors of young college students on Facebook, we conducted focus groups in conjunction with a content analysis of Facebook profiles. Findings point to an extended adolescence period resting on the identity construction dilemma posed by digital social networks.
Business Horizons, 2014
ABSTRACT In this Executive Digest, we review and extend our original Business Horizons article (M... more ABSTRACT In this Executive Digest, we review and extend our original Business Horizons article (May 2013) addressing marketing avatars (i.e., mavatars1): digital embodied, biometric profiles. In the original article we offered our marketing avatar framework, which classified existing and predicted types of mavatar applications according to data collection and application domains. However, because of the quick pace of change in this domain, we must review newly introduced mavatar applications that complete the original framework. These new applications—as well as industry and regulatory actions—paint a picture of where and how mavatars will be used, and where opportunities exist for application development. For that reason, we discuss current applications and additional predictions for future use.
Skip to main content: ...