France Belanger - Academia.edu (original) (raw)

Uploads

Papers by France Belanger

Research paper thumbnail of Communication Mode Choices in Distributed Teams

Advances in information technologies facilitate new organizational forms and new ways of structur... more Advances in information technologies facilitate new organizational forms and new ways of structuring work, such as the use of distributed teams. In distributed environments, individuals have many choices of communication modes for use with colleagues. Previous research has primarily addressed the need for richness of a medium to “fit ” the characteristics of the communication task being performed. There has been little research on when and how different communication technologies are used in the performance of specific communication-based work processes (e.g., information gathering, relationship development). Using an interpretive case study approach, and guided by a hermeneutic perspective, texts from interviews of 40 individuals working in distributed teams in two organizations were analyzed. Analysis was conducted in three stages: (1) key patterns of meanings expressed by each employee, (2) key patterns of meaning that emerge across organizations, and (3) broader conceptual and m...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Investigating the Moderating Impact of National Culture in Information Systems Security Policy Violation: The Case of Italy and Ethiopia

Information systems security (ISS) has become one of the top agendas of companies located in the ... more Information systems security (ISS) has become one of the top agendas of companies located in the developed world. Despite this fact, there is an increasing trend in the types and frequency of ISS breaches. Most of the time researchers and practitioners focus on threat that are caused by external agents while most of the threats are originated from insiders. In addition to this, the majority of the investments and researches around ISS are limited to technically oriented solutions. It is now realized that the technical approach alone couldn’t bring the required level of ISS, and this led ISS researchers to embark on socio-technical approaches. One of the critical social factors that has been given little emphasis is culture. Thus, this research investigates the impact of national culture on employees’ ISS behaviour. Specifically, it answers the question “what is the moderating impact of national culture on the influence of ISS countermeasures on employees’ intention to violate ISS po...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspective

Computers & Security

ABSTRACT Recent decades have seen numerous studies of individual information security behaviors a... more ABSTRACT Recent decades have seen numerous studies of individual information security behaviors and compliance within organizational contexts. One regular finding is that individuals continue to fail at compliance; however the explanations for why this occurs typically fail to consider the temporal, emergent and dynamic nature of security encounters between human users information security-related artifacts when they come together in the practice of security. In addition, existing research typically does not consider the inherent tension that exists between information systems (IS) use and security controls where the former is used to perform tasks and the latter may constrain the accomplishment of those tasks. This paper offers a new perspective that may better explain how the human and the security-related artifacts they create interact to both afford and constrain the enactment of information security. Our perspective builds on Pickering's mangle of practice metaphor to consider the constitutive entanglement of humans and artifacts and explain information security behaviors. This perspective is applied and discussed in the context of insider compliance with information security policies but could apply to a wide range of other information security and information systems behavioral contexts.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Online communities: satisfaction and continued use intention

Inf. Res., 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors

Proceedings of the 50th Hawaii International Conference on System Sciences (2017)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors

Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dealing with digital traces: Understanding protective behaviors on mobile devices

The Journal of Strategic Information Systems

Abstract With increasingly digitization, more and more information is collected from individuals ... more Abstract With increasingly digitization, more and more information is collected from individuals and organizations, leading to several privacy concerns. These risks are further heightened in the mobile realm as data collection can occur continuously and ubiquitously. When individuals use their own devices in work settings, these issues become concerns for organization as well. The question then is how to ensure individuals perform proper information protection behaviors on mobile devices. In this research, we develop a model of mobile information protection based on an integration of the Theory of Planned Behavior and the information privacy literature to explore the antecedents of the attitude of individuals towards sharing information on their mobile devices, their intentions to use protective settings, and their actual practices. The model is tested with data from 228 iPhone users. The results indicate that mobile information protection intention leads to actual privacy settings practice, and that attitude towards information sharing and mobile privacy protection self-efficacy affect this intention. Determinants of attitude towards information sharing include mobile privacy concern and trust of the mobile platform. Finally, prior invasion experience is related to privacy concern. These findings provide insights into factors that can be targeted to enhance individuals’ protective actions to limit the amount of digital information they share via their smartphones.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned

Communications of the Association for Information Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multilevel Research in Information Systems: Concepts, Strategies, Problems, and Pitfalls

Journal of the Association for Information Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems

MIS Quarterly

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy Strategies for Electronic Government

Privacy Strategies for Electronic Government 163 Introduction Electronic commerce in the private ... more Privacy Strategies for Electronic Government 163 Introduction Electronic commerce in the private sector is growing by astronomical meas-ures. Estimates vary greatly, but commerce on the Internet has been forecasted to exceed $37 billion in the next three years. In addition, the number ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Children Online Privacy: Issues with Parental Awareness and Control

Abstract As children increasingly use the Internet, there have been mounting concerns about their... more Abstract As children increasingly use the Internet, there have been mounting concerns about their privacy online. As a result, the US Congress enacted the Children's Online Privacy Protection Act (COPPA) in 1998 to prohibit web sites from collecting information from children under 13 years of age without verifiable parental consent. Unfortunately, few technologies and tools are available for parents to provide this consent. Further, our research demonstrates that very few parents are even aware of the laws and technologies ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Distance Education: A Telecommuting Perspective

Amcis 1998 Proceedings, 1998

... Other characteristics of DE include joining the teacher and learner through media, and the pr... more ... Other characteristics of DE include joining the teacher and learner through media, and the provision for two-way communication (Keegan, 1986). ... usage of both computers and telecommunications to substitute for the commute of employees to an office” (Belanger & Collins, ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Determinants of On-Line Consumer Satisfaction: A Conjoint Analysis

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Information Systems for Business : An Experiental Approach

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Panel Discussion Proposal Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Conjoint Analysis of Online Consumer SATISFACTION1

Journal of Electronic Commerce Research, 2005

... available for a product is perceived as more important by consumers in affecting their satisf... more ... available for a product is perceived as more important by consumers in affecting their satisfaction? ... the environmental correlation between factors is large and the number of factors on the ... Sample The sample consisted of 188 undergraduate students (average age of 22 years old ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of End-User Learning through Application Play

Information Technology Learning and Performance Journal, 2000

As today’s knowledge workers tend to have less clearly defined outputs, many organizations are co... more As today’s knowledge workers tend to have less clearly defined outputs, many organizations are concerned with employees’ non-work use of technologies during office hours. In addition, as organizations strive to increase the job efficiency of new hires, managers must collapse overall training time while providing constant on-the-job training. This manuscript argues that individuals’ play with computer applications can be considered a form of self-directed, experiential learning. Drawing from information systems research and individual learning theories, an emerging framework for research on the role of application and technology play in individual learning is proposed. The framework suggests that self-directed experience and application of technology to work-related tasks is a moderator of the relationship between selfdirected experience and individual learning. The manuscript presents two real life examples to illustrate the inter-relationships of the constructs in the framework. Research recommendations and guidelines for practitioners are then presented.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Perceptions of business-to-consumer electronic commerce: a comparison of two cultures

Proceedings of the 2000 Information Resources Management Association International Conference on Challenges of Information Technology Management in the 21st Century, May 21, 2000

Google, Inc. (search). SIGN IN SIGN UP. Perceptions of business-to-consumer electronic commerce: ... more Google, Inc. (search). SIGN IN SIGN UP. Perceptions of business-to-consumer electronic commerce: a comparison of two cultures. Authors: France Belanger, Craig van Slyke, Published in: · Proceeding. Proceedings of the 2000 ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Use of collaborative technologies in distributed work: a case study

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Communication Mode Choices in Distributed Teams

Advances in information technologies facilitate new organizational forms and new ways of structur... more Advances in information technologies facilitate new organizational forms and new ways of structuring work, such as the use of distributed teams. In distributed environments, individuals have many choices of communication modes for use with colleagues. Previous research has primarily addressed the need for richness of a medium to “fit ” the characteristics of the communication task being performed. There has been little research on when and how different communication technologies are used in the performance of specific communication-based work processes (e.g., information gathering, relationship development). Using an interpretive case study approach, and guided by a hermeneutic perspective, texts from interviews of 40 individuals working in distributed teams in two organizations were analyzed. Analysis was conducted in three stages: (1) key patterns of meanings expressed by each employee, (2) key patterns of meaning that emerge across organizations, and (3) broader conceptual and m...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Investigating the Moderating Impact of National Culture in Information Systems Security Policy Violation: The Case of Italy and Ethiopia

Information systems security (ISS) has become one of the top agendas of companies located in the ... more Information systems security (ISS) has become one of the top agendas of companies located in the developed world. Despite this fact, there is an increasing trend in the types and frequency of ISS breaches. Most of the time researchers and practitioners focus on threat that are caused by external agents while most of the threats are originated from insiders. In addition to this, the majority of the investments and researches around ISS are limited to technically oriented solutions. It is now realized that the technical approach alone couldn’t bring the required level of ISS, and this led ISS researchers to embark on socio-technical approaches. One of the critical social factors that has been given little emphasis is culture. Thus, this research investigates the impact of national culture on employees’ ISS behaviour. Specifically, it answers the question “what is the moderating impact of national culture on the influence of ISS countermeasures on employees’ intention to violate ISS po...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspective

Computers & Security

ABSTRACT Recent decades have seen numerous studies of individual information security behaviors a... more ABSTRACT Recent decades have seen numerous studies of individual information security behaviors and compliance within organizational contexts. One regular finding is that individuals continue to fail at compliance; however the explanations for why this occurs typically fail to consider the temporal, emergent and dynamic nature of security encounters between human users information security-related artifacts when they come together in the practice of security. In addition, existing research typically does not consider the inherent tension that exists between information systems (IS) use and security controls where the former is used to perform tasks and the latter may constrain the accomplishment of those tasks. This paper offers a new perspective that may better explain how the human and the security-related artifacts they create interact to both afford and constrain the enactment of information security. Our perspective builds on Pickering's mangle of practice metaphor to consider the constitutive entanglement of humans and artifacts and explain information security behaviors. This perspective is applied and discussed in the context of insider compliance with information security policies but could apply to a wide range of other information security and information systems behavioral contexts.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Online communities: satisfaction and continued use intention

Inf. Res., 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors

Proceedings of the 50th Hawaii International Conference on System Sciences (2017)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors

Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Dealing with digital traces: Understanding protective behaviors on mobile devices

The Journal of Strategic Information Systems

Abstract With increasingly digitization, more and more information is collected from individuals ... more Abstract With increasingly digitization, more and more information is collected from individuals and organizations, leading to several privacy concerns. These risks are further heightened in the mobile realm as data collection can occur continuously and ubiquitously. When individuals use their own devices in work settings, these issues become concerns for organization as well. The question then is how to ensure individuals perform proper information protection behaviors on mobile devices. In this research, we develop a model of mobile information protection based on an integration of the Theory of Planned Behavior and the information privacy literature to explore the antecedents of the attitude of individuals towards sharing information on their mobile devices, their intentions to use protective settings, and their actual practices. The model is tested with data from 228 iPhone users. The results indicate that mobile information protection intention leads to actual privacy settings practice, and that attitude towards information sharing and mobile privacy protection self-efficacy affect this intention. Determinants of attitude towards information sharing include mobile privacy concern and trust of the mobile platform. Finally, prior invasion experience is related to privacy concern. These findings provide insights into factors that can be targeted to enhance individuals’ protective actions to limit the amount of digital information they share via their smartphones.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned

Communications of the Association for Information Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multilevel Research in Information Systems: Concepts, Strategies, Problems, and Pitfalls

Journal of the Association for Information Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems

MIS Quarterly

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy Strategies for Electronic Government

Privacy Strategies for Electronic Government 163 Introduction Electronic commerce in the private ... more Privacy Strategies for Electronic Government 163 Introduction Electronic commerce in the private sector is growing by astronomical meas-ures. Estimates vary greatly, but commerce on the Internet has been forecasted to exceed $37 billion in the next three years. In addition, the number ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Children Online Privacy: Issues with Parental Awareness and Control

Abstract As children increasingly use the Internet, there have been mounting concerns about their... more Abstract As children increasingly use the Internet, there have been mounting concerns about their privacy online. As a result, the US Congress enacted the Children's Online Privacy Protection Act (COPPA) in 1998 to prohibit web sites from collecting information from children under 13 years of age without verifiable parental consent. Unfortunately, few technologies and tools are available for parents to provide this consent. Further, our research demonstrates that very few parents are even aware of the laws and technologies ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Distance Education: A Telecommuting Perspective

Amcis 1998 Proceedings, 1998

... Other characteristics of DE include joining the teacher and learner through media, and the pr... more ... Other characteristics of DE include joining the teacher and learner through media, and the provision for two-way communication (Keegan, 1986). ... usage of both computers and telecommunications to substitute for the commute of employees to an office” (Belanger & Collins, ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Determinants of On-Line Consumer Satisfaction: A Conjoint Analysis

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Information Systems for Business : An Experiental Approach

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Panel Discussion Proposal Study Abroad as an Education Experience: Challenges, Realizations, and Lessons Learned

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Conjoint Analysis of Online Consumer SATISFACTION1

Journal of Electronic Commerce Research, 2005

... available for a product is perceived as more important by consumers in affecting their satisf... more ... available for a product is perceived as more important by consumers in affecting their satisfaction? ... the environmental correlation between factors is large and the number of factors on the ... Sample The sample consisted of 188 undergraduate students (average age of 22 years old ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of End-User Learning through Application Play

Information Technology Learning and Performance Journal, 2000

As today’s knowledge workers tend to have less clearly defined outputs, many organizations are co... more As today’s knowledge workers tend to have less clearly defined outputs, many organizations are concerned with employees’ non-work use of technologies during office hours. In addition, as organizations strive to increase the job efficiency of new hires, managers must collapse overall training time while providing constant on-the-job training. This manuscript argues that individuals’ play with computer applications can be considered a form of self-directed, experiential learning. Drawing from information systems research and individual learning theories, an emerging framework for research on the role of application and technology play in individual learning is proposed. The framework suggests that self-directed experience and application of technology to work-related tasks is a moderator of the relationship between selfdirected experience and individual learning. The manuscript presents two real life examples to illustrate the inter-relationships of the constructs in the framework. Research recommendations and guidelines for practitioners are then presented.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Perceptions of business-to-consumer electronic commerce: a comparison of two cultures

Proceedings of the 2000 Information Resources Management Association International Conference on Challenges of Information Technology Management in the 21st Century, May 21, 2000

Google, Inc. (search). SIGN IN SIGN UP. Perceptions of business-to-consumer electronic commerce: ... more Google, Inc. (search). SIGN IN SIGN UP. Perceptions of business-to-consumer electronic commerce: a comparison of two cultures. Authors: France Belanger, Craig van Slyke, Published in: · Proceeding. Proceedings of the 2000 ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Use of collaborative technologies in distributed work: a case study

Bookmarks Related papers MentionsView impact

Research paper thumbnail of (2022). "The mediating role of group dynamics in shaping received social support from active and passive use in online health communities," Information & Management (I&M) (accepted 25-Jan-2022).

Information & Management, 2022

Exchanging social support on online health communities (OHCs) can be beneficial to people’s healt... more Exchanging social support on online health communities (OHCs) can be beneficial to people’s health, but the OHC characteristics that promote environments in which users feel socially supported are understudied. We develop a model that examines the mediating influence of OHC cohesiveness, altruism, and universality on the relationships between active and passive use and received OHC social support. Our findings indicate that social support can be derived from both active and passive use of the OHC. Although active use can directly stimulate received OHC social support, the relationship between passive use and social support is fully mediated by OHC group dynamics.

Bookmarks Related papers MentionsView impact