Joanne Hale - Academia.edu (original) (raw)

Uploads

Top journal articles by Joanne Hale

Research paper thumbnail of (2013). “Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior,” International Journal of Human-Computer Studies (IJHCS)

International Journal of Human-Computer Studies

The use of mobile applications continues to experience exponential growth. Using mobile apps typi... more The use of mobile applications continues to experience exponential growth. Using mobile apps typically requires the disclosure of location data, which often accompanies requests for various other forms of private information. Existing research on information privacy has implied that consumers are willing to accept privacy risks for relatively negligible benefits, and the offerings of mobile apps based on location-based services (LBS) appear to be no different. However, until now, researchers have struggled to replicate realistic privacy risks within experimental methodologies designed to manipulate independent variables. Moreover, minimal research has successfully captured actual information disclosure over mobile devices based on realistic risk perceptions. The purpose of this study is to propose and test a more realistic experimental methodology designed to replicate real perceptions of privacy risk and capture the effects of actual information disclosure decisions. As with prior research, this study employs a theoretical lens based on privacy calculus. However, we draw more detailed and valid conclusions due to our use of improved methodological rigor. We report the results of a controlled experiment involving consumers (n=1025) in a range of ages, levels of education, and employment experience. Based on our methodology, we find that only a weak, albeit significant, relationship exists between information disclosure intentions and actual disclosure. In addition, this relationship is heavily moderated by the consumer practice of disclosing false data. We conclude by discussing the contributions of our methodology and the possibilities for extending it for additional mobile privacy research.

Papers by Joanne Hale

Research paper thumbnail of Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior

Research paper thumbnail of Examining the rationality of information disclosure through mobile devices

Research paper thumbnail of Towards a Reference Architecture of Intent for Information Systems Strategic Alignment

Research paper thumbnail of Pavement Management System Review

Research paper thumbnail of Deriving a Taxonomy of It Transition Costs

Research paper thumbnail of Non-Linear Effects of Information Systems Innovation

Research paper thumbnail of Decision Processes during Crisis Response: An Exploratory Investigation

Journal of Managerial Issues, Sep 22, 2006

... Fink (1986) categorizes crisis manage-ment into five interdependent stages: mitigation, plann... more ... Fink (1986) categorizes crisis manage-ment into five interdependent stages: mitigation, planning, warning, re-sponse, and recovery. ... of personal identification (such as names and locations), rather than factual errors regarding crisis events, decisions, or communications. ...

Research paper thumbnail of Key Issues in IS Project Management: The Executive Perspective - Research in Progress

Research paper thumbnail of Improving Data Quality in Conversion Projects: The Impact of Source Systems and Team Experience

Research paper thumbnail of Breaking the Iron Triangle: The Impact of Information Sufficiency on Project Portfolio Decisions

Research paper thumbnail of A Case Study Approach to Teaching Component Based Software Engineering

Research paper thumbnail of Revisiting Knowledge, Skills, and Abilities Needed for Development and Delivery Project Staff

This paper is grounded on the proposition that quality and timeliness of provisioning business in... more This paper is grounded on the proposition that quality and timeliness of provisioning business information system solutions can be advanced by staffing development projects with personnel based on appropriate task related Knowledge, Skills, Abilities and Personal Characteristics (KSA- P). Defining a standard repeatable process for such staffing decisions requires a consistent classification scheme for the KSA-Ps, which this paper develops

Research paper thumbnail of PAIR PROGRAMMING: PAIRING ALONE IS NOT ENOUGH Version 1

The current focus on lightweight software processes emphasizes improvements in productivity and q... more The current focus on lightweight software processes emphasizes improvements in productivity and quality when two programmers work closely during development. We examine the productivity of two -person teams tasked to work independently on module construction versus two-person teams tasked to work concurrently on module construction. Analysis of this comparison reveals that teams in which member work more independently are significantly more productive than tightly coupled teams. Pair programming and lightweight software processes need to incorporate approaches designed to counteract this phenomenon.

Research paper thumbnail of A Field Study of Developer Pairs: Productivity Impacts and Implications

RESUMEN RESUMEN Researchers have reported varied, even disparate, findings about the productivity... more RESUMEN RESUMEN Researchers have reported varied, even disparate, findings about the productivity of paired versus independent programmers. The authors conclude that the role-based coordination protocol associated with agile software methodologies overcomes a significant productivity loss otherwise associated with concurrent software development pairs.

Research paper thumbnail of Project Level Decision Rights: A Contingency Perspective

The study of IT development governance rests on the assumption of goal difference between the pro... more The study of IT development governance rests on the assumption of goal difference between the procurer (customer or user) and the provider (development organization). But governance research also finds that the knowledge of both parties must be incorporated in order to maximize decision effectiveness. The goal difference is resolved through governance forms that assign different decisions to the procurer and the provider. But this splitting of decision rights can impact how knowledge is shared. At the same time, unified teams are also capable of completing effective development projects as witnessed by the successes of agile development methodologies. These teams do not split decision rights and knowledge is more readily shared. Successful projects under one governance model may be identifiably different from successful projects under the other. This study extends governance research by understanding development project characteristics that indicate whether splitting decision rights...

Research paper thumbnail of Software Component Test Cases: The Need for a Conceptual Taxonomy

Component-based software engineering is becoming an increasingly popular endeavor, in part becaus... more Component-based software engineering is becoming an increasingly popular endeavor, in part because of the perceived gains in terms of software reuse. However, we feel that for component engineering to be successful in fully exploiting reuse opportunities, components must be independent of the processes used to derive them. That is, there should be standard canonical forms for software artifacts that do not carry with them the baggage associated with a particular development methodology or process. This is the type of effort associated with the rapidly emerging discipline of software architecture, and would make the notion of "software component" much more like the analogous "hardware component" concept from hardware engineering. In this paper, we outline some initial modest ideas with regard to capturing a process-independent notion of a component "test case." Ultimately, the idea behind this work is to produce a complete conceptual framework for unders...

Research paper thumbnail of Task induced modulation of neural oscillations in electrophysiological brain networks

NeuroImage, 2012

In recent years, one of the most important findings in systems neuroscience has been the identifi... more In recent years, one of the most important findings in systems neuroscience has been the identification of large scale distributed brain networks. These networks support healthy brain function and are perturbed in a number of neurological disorders (e.g. schizophrenia). Their study is therefore an important and evolving focus for neuroscience research. The majority of network studies are conducted using functional magnetic resonance imaging (fMRI) which relies on changes in blood oxygenation induced by neural activity. However recently, a small number of studies have begun to elucidate the electrical origin of fMRI networks by searching for correlations between neural oscillatory signals from spatially separate brain areas in magnetoencephalography (MEG) data. Here we advance this research area. We introduce two methodological extensions to previous independent component analysis (ICA) approaches to MEG network characterisation: 1) we show how to derive pan-spectral networks that combine independent components computed within individual frequency bands. 2) We show how to measure the temporal evolution of each network with millisecond temporal resolution. We apply our approach to ~10h of MEG data recorded in 28 experimental sessions during 3 separate cognitive tasks showing that a number of networks could be identified and were robust across time, task, subject and recording session. Further, we show that neural oscillations in those networks are modulated by memory load, and task relevance. This study furthers recent findings on electrodynamic brain networks and paves the way for future clinical studies in patients in which abnormal connectivity is thought to underlie core symptoms.

Research paper thumbnail of The Outcome Based Method for Project Stakeholder Identification

Research paper thumbnail of Deriving a Taxonomy of It Transition Costs

Those charged with implementing information technology often face the daunting task of assessing ... more Those charged with implementing information technology often face the daunting task of assessing the total organ- izational costs of such initiatives. Our study posits evaluating such expenditures as IT transition costs - organizational re- source expenditures stemming from a positive IT investment decision. A content analytic review of academic, IT- related arti- cles yielded 57 cases germane to the construct.

Research paper thumbnail of (2013). “Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior,” International Journal of Human-Computer Studies (IJHCS)

International Journal of Human-Computer Studies

The use of mobile applications continues to experience exponential growth. Using mobile apps typi... more The use of mobile applications continues to experience exponential growth. Using mobile apps typically requires the disclosure of location data, which often accompanies requests for various other forms of private information. Existing research on information privacy has implied that consumers are willing to accept privacy risks for relatively negligible benefits, and the offerings of mobile apps based on location-based services (LBS) appear to be no different. However, until now, researchers have struggled to replicate realistic privacy risks within experimental methodologies designed to manipulate independent variables. Moreover, minimal research has successfully captured actual information disclosure over mobile devices based on realistic risk perceptions. The purpose of this study is to propose and test a more realistic experimental methodology designed to replicate real perceptions of privacy risk and capture the effects of actual information disclosure decisions. As with prior research, this study employs a theoretical lens based on privacy calculus. However, we draw more detailed and valid conclusions due to our use of improved methodological rigor. We report the results of a controlled experiment involving consumers (n=1025) in a range of ages, levels of education, and employment experience. Based on our methodology, we find that only a weak, albeit significant, relationship exists between information disclosure intentions and actual disclosure. In addition, this relationship is heavily moderated by the consumer practice of disclosing false data. We conclude by discussing the contributions of our methodology and the possibilities for extending it for additional mobile privacy research.

Research paper thumbnail of Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior

Research paper thumbnail of Examining the rationality of information disclosure through mobile devices

Research paper thumbnail of Towards a Reference Architecture of Intent for Information Systems Strategic Alignment

Research paper thumbnail of Pavement Management System Review

Research paper thumbnail of Deriving a Taxonomy of It Transition Costs

Research paper thumbnail of Non-Linear Effects of Information Systems Innovation

Research paper thumbnail of Decision Processes during Crisis Response: An Exploratory Investigation

Journal of Managerial Issues, Sep 22, 2006

... Fink (1986) categorizes crisis manage-ment into five interdependent stages: mitigation, plann... more ... Fink (1986) categorizes crisis manage-ment into five interdependent stages: mitigation, planning, warning, re-sponse, and recovery. ... of personal identification (such as names and locations), rather than factual errors regarding crisis events, decisions, or communications. ...

Research paper thumbnail of Key Issues in IS Project Management: The Executive Perspective - Research in Progress

Research paper thumbnail of Improving Data Quality in Conversion Projects: The Impact of Source Systems and Team Experience

Research paper thumbnail of Breaking the Iron Triangle: The Impact of Information Sufficiency on Project Portfolio Decisions

Research paper thumbnail of A Case Study Approach to Teaching Component Based Software Engineering

Research paper thumbnail of Revisiting Knowledge, Skills, and Abilities Needed for Development and Delivery Project Staff

This paper is grounded on the proposition that quality and timeliness of provisioning business in... more This paper is grounded on the proposition that quality and timeliness of provisioning business information system solutions can be advanced by staffing development projects with personnel based on appropriate task related Knowledge, Skills, Abilities and Personal Characteristics (KSA- P). Defining a standard repeatable process for such staffing decisions requires a consistent classification scheme for the KSA-Ps, which this paper develops

Research paper thumbnail of PAIR PROGRAMMING: PAIRING ALONE IS NOT ENOUGH Version 1

The current focus on lightweight software processes emphasizes improvements in productivity and q... more The current focus on lightweight software processes emphasizes improvements in productivity and quality when two programmers work closely during development. We examine the productivity of two -person teams tasked to work independently on module construction versus two-person teams tasked to work concurrently on module construction. Analysis of this comparison reveals that teams in which member work more independently are significantly more productive than tightly coupled teams. Pair programming and lightweight software processes need to incorporate approaches designed to counteract this phenomenon.

Research paper thumbnail of A Field Study of Developer Pairs: Productivity Impacts and Implications

RESUMEN RESUMEN Researchers have reported varied, even disparate, findings about the productivity... more RESUMEN RESUMEN Researchers have reported varied, even disparate, findings about the productivity of paired versus independent programmers. The authors conclude that the role-based coordination protocol associated with agile software methodologies overcomes a significant productivity loss otherwise associated with concurrent software development pairs.

Research paper thumbnail of Project Level Decision Rights: A Contingency Perspective

The study of IT development governance rests on the assumption of goal difference between the pro... more The study of IT development governance rests on the assumption of goal difference between the procurer (customer or user) and the provider (development organization). But governance research also finds that the knowledge of both parties must be incorporated in order to maximize decision effectiveness. The goal difference is resolved through governance forms that assign different decisions to the procurer and the provider. But this splitting of decision rights can impact how knowledge is shared. At the same time, unified teams are also capable of completing effective development projects as witnessed by the successes of agile development methodologies. These teams do not split decision rights and knowledge is more readily shared. Successful projects under one governance model may be identifiably different from successful projects under the other. This study extends governance research by understanding development project characteristics that indicate whether splitting decision rights...

Research paper thumbnail of Software Component Test Cases: The Need for a Conceptual Taxonomy

Component-based software engineering is becoming an increasingly popular endeavor, in part becaus... more Component-based software engineering is becoming an increasingly popular endeavor, in part because of the perceived gains in terms of software reuse. However, we feel that for component engineering to be successful in fully exploiting reuse opportunities, components must be independent of the processes used to derive them. That is, there should be standard canonical forms for software artifacts that do not carry with them the baggage associated with a particular development methodology or process. This is the type of effort associated with the rapidly emerging discipline of software architecture, and would make the notion of "software component" much more like the analogous "hardware component" concept from hardware engineering. In this paper, we outline some initial modest ideas with regard to capturing a process-independent notion of a component "test case." Ultimately, the idea behind this work is to produce a complete conceptual framework for unders...

Research paper thumbnail of Task induced modulation of neural oscillations in electrophysiological brain networks

NeuroImage, 2012

In recent years, one of the most important findings in systems neuroscience has been the identifi... more In recent years, one of the most important findings in systems neuroscience has been the identification of large scale distributed brain networks. These networks support healthy brain function and are perturbed in a number of neurological disorders (e.g. schizophrenia). Their study is therefore an important and evolving focus for neuroscience research. The majority of network studies are conducted using functional magnetic resonance imaging (fMRI) which relies on changes in blood oxygenation induced by neural activity. However recently, a small number of studies have begun to elucidate the electrical origin of fMRI networks by searching for correlations between neural oscillatory signals from spatially separate brain areas in magnetoencephalography (MEG) data. Here we advance this research area. We introduce two methodological extensions to previous independent component analysis (ICA) approaches to MEG network characterisation: 1) we show how to derive pan-spectral networks that combine independent components computed within individual frequency bands. 2) We show how to measure the temporal evolution of each network with millisecond temporal resolution. We apply our approach to ~10h of MEG data recorded in 28 experimental sessions during 3 separate cognitive tasks showing that a number of networks could be identified and were robust across time, task, subject and recording session. Further, we show that neural oscillations in those networks are modulated by memory load, and task relevance. This study furthers recent findings on electrodynamic brain networks and paves the way for future clinical studies in patients in which abnormal connectivity is thought to underlie core symptoms.

Research paper thumbnail of The Outcome Based Method for Project Stakeholder Identification

Research paper thumbnail of Deriving a Taxonomy of It Transition Costs

Those charged with implementing information technology often face the daunting task of assessing ... more Those charged with implementing information technology often face the daunting task of assessing the total organ- izational costs of such initiatives. Our study posits evaluating such expenditures as IT transition costs - organizational re- source expenditures stemming from a positive IT investment decision. A content analytic review of academic, IT- related arti- cles yielded 57 cases germane to the construct.

Research paper thumbnail of Cost estimation for component based software development

Proceedings of the 36th annual Southeast regional conference on - ACM-SE 36, 1998

IJochm also adoplcd lhc Inlcrnicdialc COCOMO Mndcl lo apportion cosl lo individual components. Co... more IJochm also adoplcd lhc Inlcrnicdialc COCOMO Mndcl lo apportion cosl lo individual components. Consider the X500 lint prnjccl again, made up of the compmtnts lislcd in Table I. ... Table 1 Component Level Intermediate COCOMO Had on the 30 MM computed ...