Saji Mathew - Academia.edu (original) (raw)

Papers by Saji Mathew

Research paper thumbnail of Privacy Protection Dashboard

Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, 2017

Cloud computing services have gained a lot of attraction in the recent years, but the shift of da... more Cloud computing services have gained a lot of attraction in the recent years, but the shift of data from user-owned desktops and laptops to cloud storage systems has led to serious data privacy implications for the users. Even though privacy notices supplied by the cloud vendors details the data practices and options to protect their privacy, the lengthy and free-flowing textual format of the notices are often difficult to comprehend by the users. Thus we propose a simplified presentation format for privacy practices and choices termed as "Privacy-Dashboard" based on Protection Motivation Theory (PMT) and we intend to test the effectiveness of presentation format using cognitive-fit theory. Also, we indirectly model the cloud privacy concerns using Item-Response Theory (IRT) model. We contribute to the information privacy literature by addressing the literature gap to develop privacy protection artifacts in order to improve the privacy protection behaviors of individual users. The proposed "privacy dashboard" would provide an easy-to-use choice mechanisms that allow consumers to control how their data is collected and used.

Research paper thumbnail of Fit of Development Methodologies in Software Projects

Software project outcomes characterized by meeting goal achievement and performance triad of budg... more Software project outcomes characterized by meeting goal achievement and performance triad of budget, schedule and quality have been shown to be contingent upon project environment factors. However, choice of methodology and its implications on project outcomes still remain under-investigated. Following contingency theory, we empirically examine the effect of the fit between the choice of development methodology and project environment on the project outcome. We analysed a sample of 163 software development projects using PLS-SEM and our results show that the use of traditional methodology strongly countered the negative effect of requirement volatility on project outcome compared to agile methodologies and use of hybrid methodologies showed a stronger positive effect of project complexity on goal achievement. Further, for critical projects, use of agile methodologies favoured goal achievement.

Research paper thumbnail of Organizational culture and information privacy assimilation: An empirical study

Data privacy concerns in organizations have been rising over the past several decades. As per the... more Data privacy concerns in organizations have been rising over the past several decades. As per the GDPR (General Data Protection Regulation), organizations need to implement highestpossible privacy settings by design and default. This study develops a model for understanding the mechanisms of information privacy assimilation in Information Technology (IT) organizations. This study treats information privacy as a distinct dimension separate from information security. We have examined the mediating role of senior management participation and organizational culture on privacy assimilation (strategy and organizational activities). On the strategy, our findings showed that full mediating role of senior management participation for coercive forces, partial mediation for normative and mimetic forces. On the organizational activities, our findings showed that full mediating role of organizational culture for coercive forces and normative forces, partial mediation for mimetic forces. These findings would enable senior managers to identify and respond to institutional pressures by focusing on appropriate factors within the organization.

Research paper thumbnail of Privacy and Security: An Organization wide DSS Framework

The concept of data privacy (often confused with security), a relatively less focused concept in ... more The concept of data privacy (often confused with security), a relatively less focused concept in the IT industry, is being studied in this research. The complexity surrounding data privacy (compared to security), is often over simplified. Combining the literature and inputs from an exploratory study involving senior managers from business critical domains, we present a comprehensive approach towards managing data privacy in an organization. In this privacy framework, a decision support system assists in the development of appropriate actions for information privacy protection. \ \ Privacy is viewed as a key competitive differentiator for organizations in the current and evolving digital markets. The proposed Decision Support System can incorporate suitable algorithms and approaches to facilitate ‘the exploration of different options for enhancing information privacy’ and ‘choose the best option based on the needs of various business scenarios’. With the rapid evolution of technology and regulations, our proposed DSS can help senior managers, mid-level managers and employees cope with privacy and act as an agent to enhance an organization’s privacy practices

Research paper thumbnail of Business Analytics and Business Value: A Case Study

In the backdrop of growing adoption of business analytics in various business domains, it is impo... more In the backdrop of growing adoption of business analytics in various business domains, it is important for investing firms to understand how business value is created from the investments. Earlier studies conducted in IT domain have highlighted how higher investment in technology may not bring more returns, rather how IT as a capability built by the organization acts as a key mediator in the business value creation. This research extends the model to business analytics, first to identify elements of underlying concepts like analytics technology assets and analytics capability, using a case study approach. This research further captures how analytics resources contribute to business performance by developing suitable operational and organizational measures for performance. This research contributes to the body of knowledge related to business analytics in the form of theory building.

Research paper thumbnail of Cloud Users’ Privacy Concerns in the Indian Healthcare Industry

The growing adoption of Cloud computing in various government and business domain makes it of imp... more The growing adoption of Cloud computing in various government and business domain makes it of importance for users to understand how their information is protected and accounted for in Cloud contracts especially in data sensitive domains such as healthcare. Prior studies have highlighted that contract terms for Cloud computing are evolving based on user's information privacy protective responses and liability is the most negotiated term. There is extant research on individual privacy but very few studies have addressed organizational privacy. This research inductively develops a framework using a multiple case study approach that addresses the following descriptive question-what dimensions constitute an organization's major privacy concerns when exchanging data in the Cloud. The findings from this research will have implications for managers while incorporating penalty clauses in Cloud contracts and informs government in forming privacy regulations suitable for the healthcare sector.

Research paper thumbnail of Information Privacy Assimilation in Organizations - A Neo Institutional Approach

Information privacy at the organizational level is receiving increased attention due to the huge ... more Information privacy at the organizational level is receiving increased attention due to the huge amount of personal information being stored, transmitted across national boundaries, and ownership being shared between organizations due to change in business dynamics. There has been some recent developments in the field of data privacy with several countries enacting or strengthening data protection laws, influencing the organizational privacy policies. However, privacy assimilation is not simple as privacy has multiple aspects. There is a great need for investigating the forces that impact the privacy preserving practices within an organization. To fill this gap, this paper proposes a model based on neo-institutional theory to understand the influencing forces, mediating forces within an organization for information privacy assimilation impelling the business strategies and activities at the organizational level. This model considers privacy as an independent entity and evaluates the...

Research paper thumbnail of Differential Adoption of Cloud Technology: A Multiple Case Study of Large Firms and SMEs

Firms across the industry segments have been exploring cloud computing to derive benefits out of ... more Firms across the industry segments have been exploring cloud computing to derive benefits out of its technological features. Even though literature pertaining to cloud adoption by firms exists, the factors based on cloud-specific characteristics are mostly anecdotal in nature. Following a multiple case study approach, we identify factors specific to cloud technology adoption by firms. We further explain the differential adoption of the cloud between large and small firms. Overall we obtained 11 variables that differentiate large firms and SMEs in their adoption behavior. We further contribute to theory by mapping the extracted variables of cloud adoption to Diffusion of innovation theory (DOI) and Technology organization Environment framework (TOE).

Research paper thumbnail of Impact of personalized review summaries on buying decisions: An experimental study

This study evaluates the impact of personalization of review summaries on consumers’ cognitive ef... more This study evaluates the impact of personalization of review summaries on consumers’ cognitive efforts and buying decision. Following an experimental procedure we tested four hypotheses pertaining to online buyers’ decision process. Our results show that personalized review summary significantly reduces the information processing effort and information requirements of those who received personalized review summaries as compared to those who did not. This study thus contributes to e-commerce literature on online buyer behavior and recommender systems strategy.

Research paper thumbnail of An Empirical Investigation into Understanding the Business Value of Business Analytics

Research paper thumbnail of Understanding Information Privacy Assimilation in IT Organizations using Multi-site Case Studies

Communications of the Association for Information Systems, 2018

We develop a framework for understanding the mechanisms of information privacy assimilation in in... more We develop a framework for understanding the mechanisms of information privacy assimilation in information technology (IT) organizations. Following neo-institutional theory, we develop a broad conceptual model and further build a detailed theory based on a multi-site, multi-case study of 18 organizations. We treat information privacy as a distinct dimension separate from information security. As in the case of information security, senior management support emerged as a mediator between the external influences of coercive, mimetic, and normative forces and information privacy assimilation. Privacy capability emerged as a distinct construct that had a moderating effect on the influence of coercive and normative forces on privacy assimilation. Similarly, cultural acceptability also moderated the effect of external forces on privacy assimilation. We produce a theoretical model that future research can empirically test. The findings would enable senior managers identify and respond to institutional pressures by focusing on appropriate factors in the organizations.

Research paper thumbnail of Vendor Risks in Remote Infrastructure Management Services

Global Sourcing of Services, 2016

Remote Infrastructure Management Services (RIMS) is a fast growing service in IT which has been o... more Remote Infrastructure Management Services (RIMS) is a fast growing service in IT which has been outsourced to third party service providers by leading global firms. Service providers in this line face huge challenges because they have to ensure agreed upon service levels by monitoring and controlling the client’s infrastructure from an offshore location. This chapter explores the relatively nascent area of RIMS to identify and categorize service provider risks. The three categories of risks that emerged from this analysis are: (i) service delivery risks, (ii) relationship specific risks, and (iii) macroeconomic risks. There is a close relationship between the first two categories of risks and similar categories of risks in application development. However, dimensions of timeline and requirements uncertainty elicit a different set of risks in RIMS. Relationship maturity, nature of client, contract design, and nature of service are contextual factors which influence the degree of risks in RIMS.

Research paper thumbnail of Global Sourcing of Services

Research paper thumbnail of Web personalization for user acceptance of technology: An empirical investigation of E-government services

Information Systems Frontiers, 2015

E-Commerce firms have adopted Web Personalization techniques extensively in the form of recommend... more E-Commerce firms have adopted Web Personalization techniques extensively in the form of recommender systems for influencing user behavior for customer retention. Although there are numerous studies in this area, academic research addressing the role of Web Personalization in user acceptance of technology is very scant. Further, owing to the potential of recommender systems to attract and retain customers, most studies in web personalization have been done in E-Commerce setting. In this research, the 'Consumer Acceptance and Use of Information Technology' theory proposed in previous research has been extended to include web personalization as a moderator and has been tested in an E-Government context. Data collection involved conducting a laboratory experiment with the treatment group receiving personalized web forms for requesting an E-Government service. Our analyses show that personalizing the Web by selfreference and content relevance has a significant moderator role in influencing the relationship between determinants of intention to use and behavioral intention in certain cases.

Research paper thumbnail of Web personalization in technology acceptance

2012 4th International Conference on Intelligent Human Computer Interaction (IHCI), 2012

ABSTRACT This paper studies the role of web personalization in technology acceptance in consumer ... more ABSTRACT This paper studies the role of web personalization in technology acceptance in consumer context. Web personalization has been extensively studied in various research streams. We try to study the effect of web personalization in context of technology acceptance. Most previous studies on web personalization have focused on e-commerce. We choose our domain of study as E Governance which has received much less research attention, particularly on user behavior and web personalization. We use Consumer Acceptance and use of Information Technology (UTAUT2) as the model to study consumer acceptance of an online government service channel. We follow a randomized experimental design to test how web personalization moderates the impact of performance expectancy, effort expectancy, facilitating conditions, hedonic motivation, price and habit on consumer's intention to use a technology.

Research paper thumbnail of Impact of ICT Infrastructure Capability on E-Governance Performance: Proposing an Analytical Framework

Advances in Intelligent Systems and Computing, 2015

ABSTRACT The impact of IT infrastructure capability on the performance of a firm has been address... more ABSTRACT The impact of IT infrastructure capability on the performance of a firm has been addressed quite sufficiently in the past literature but how these factors when coupled together to study the impact on E-Governance performance is yet to garner the main focus of attention. Effective E-Government readiness is characterised by efficient deployment of ICT infrastructure capability and the same has been recognized worldwide in the various studies on E-Government. A two phased study was proposed to meet the objectives defined for this research. This paper describes the work completed in the first phase. In the first phase of the study, an exploratory study was conducted to identify, articulate and contextualize variables extracted from literature survey and field survey. Finally, based on the exploratory study, the author’s work lays the groundwork for the development of a conceptual framework along with suggested methodology for understanding how ICT infrastructure capability affects E-Governance performance and direction for future work.

Research paper thumbnail of Mark-Down Pricing

International Journal of Information Systems in the Service Sector, 2012

Discount sales have been increasing in Indian retailing due to the growing competition in the sec... more Discount sales have been increasing in Indian retailing due to the growing competition in the sector. In this research the authors analyze the data of a fashion retail store to study the effect of mark-down pricing on the sales. Their store level analysis shows that mark-downs have a positive impact on sales in an aggregate level. At a style level, however, some items showed a negative and significant effect on sales. This negative influence is explained by the predominant focus of the Store to attract high end customers characterized by conspicuous consumption.

Research paper thumbnail of Mitigation of risks due to service provider behavior in offshore software development

Strategic Outsourcing: An International Journal, 2011

PurposeAlthough risks and client‐vendor relationships in IT outsourcing have been studied in prio... more PurposeAlthough risks and client‐vendor relationships in IT outsourcing have been studied in prior research, there is a paucity of studies providing insights on the mitigation of client risks through the relationship. This research aims to focus on mitigation of the ex post risks of firms engaged in offshore software development (OSD). Client risks due to service provider behavior are identified first. Further, this work seeks to identify relationship variables that could reduce the impact of determinants of risk on a risk category.Design/methodology/approachThis research followed a multiple case study method aiming to build insights and directions that would facilitate further research. The paper's goal of sampling was to choose cases which were likely to extend the emergent theory pertaining to risks and their mitigation through relationships.FindingsFindings from this study show that shirking, loss of control over information assets, and service provider lock‐in are the three...

Research paper thumbnail of Web personalization research: an information systems perspective

Journal of Systems and Information Technology, 2013

Purpose-Web personalization has been studied in different streams of research such as Marketing, ... more Purpose-Web personalization has been studied in different streams of research such as Marketing, Human Computer Interaction and Computer Science. However, an information systems perspective of web personalization research is very scarcely visible in this body of knowledge. This research review seeks to address two important questions: how has web personalization evolved as an integrative discipline? How has web personalization been treated in IS literature and where should researchers focus next? Design/methodology/approach-The paper intently follows an information systems perspective in its thematic classification of web personalization research which is consistent with the early conceptualization of information systems by logically mapping IS categories into web personalization research streams. Articles from 100 þ journals were analyzed and important concepts related to web personalization were classified from an information systems perspective. Findings-Surrounding the theme of web personalization two parallel streams of research evolved. First stream consisted of internet business models, computer science algorithms and web mining. Second stream focussed on human computer Interaction studies, user modelling and targeted marketing. Future information systems researchers in web personalization must focus on four important areas of social media, web development methodologies, emerging Internet accessing gadgets and domains other than e-Commerce. Originality/value-Web personalization has been studied previously in separate research streams. But no integrated view from different research streams exists. Although research interest in web mining has been growing as evidenced by growing number of publications an information systems perspective of web personalization research is very scarcely visible in the body of knowledge. The authors intently follow an information systems perspective in their thematic classification of web personalization research which is consistent with the early conceptualization of information systems by logically mapping IS categories into web personalization research streams. This thematic segregation of different research streams into IS framework makes our study distinct from other early reviews. They also identify four important areas where future IS researchers should focus on.

Research paper thumbnail of Achieving offshore software development success: An empirical analysis of risk mitigation through relational norms

The Journal of Strategic Information Systems, 2013

Behavioral risks such as shirking and misappropriation of information assets are more prominent i... more Behavioral risks such as shirking and misappropriation of information assets are more prominent in offshore software development context and could adversely affect offshore outsourcing success. This paper studies the moderating effects of different relational norms on the link between behavioral risks and offshore software development success. We focused on three major modes of relational norms: norm of flexibility, norm of solidarity and norm of information exchange. Using PLS path modeling to test a sample of 40 US corporations engaged in offshore software development, we found that the norms of solidarity and flexibility reduced the negative effects shirking risk on offshore software development success. Our results suggest that client firms shall benefit by forming the right mode of relational norms to achieve offshore success.

Research paper thumbnail of Privacy Protection Dashboard

Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, 2017

Cloud computing services have gained a lot of attraction in the recent years, but the shift of da... more Cloud computing services have gained a lot of attraction in the recent years, but the shift of data from user-owned desktops and laptops to cloud storage systems has led to serious data privacy implications for the users. Even though privacy notices supplied by the cloud vendors details the data practices and options to protect their privacy, the lengthy and free-flowing textual format of the notices are often difficult to comprehend by the users. Thus we propose a simplified presentation format for privacy practices and choices termed as "Privacy-Dashboard" based on Protection Motivation Theory (PMT) and we intend to test the effectiveness of presentation format using cognitive-fit theory. Also, we indirectly model the cloud privacy concerns using Item-Response Theory (IRT) model. We contribute to the information privacy literature by addressing the literature gap to develop privacy protection artifacts in order to improve the privacy protection behaviors of individual users. The proposed "privacy dashboard" would provide an easy-to-use choice mechanisms that allow consumers to control how their data is collected and used.

Research paper thumbnail of Fit of Development Methodologies in Software Projects

Software project outcomes characterized by meeting goal achievement and performance triad of budg... more Software project outcomes characterized by meeting goal achievement and performance triad of budget, schedule and quality have been shown to be contingent upon project environment factors. However, choice of methodology and its implications on project outcomes still remain under-investigated. Following contingency theory, we empirically examine the effect of the fit between the choice of development methodology and project environment on the project outcome. We analysed a sample of 163 software development projects using PLS-SEM and our results show that the use of traditional methodology strongly countered the negative effect of requirement volatility on project outcome compared to agile methodologies and use of hybrid methodologies showed a stronger positive effect of project complexity on goal achievement. Further, for critical projects, use of agile methodologies favoured goal achievement.

Research paper thumbnail of Organizational culture and information privacy assimilation: An empirical study

Data privacy concerns in organizations have been rising over the past several decades. As per the... more Data privacy concerns in organizations have been rising over the past several decades. As per the GDPR (General Data Protection Regulation), organizations need to implement highestpossible privacy settings by design and default. This study develops a model for understanding the mechanisms of information privacy assimilation in Information Technology (IT) organizations. This study treats information privacy as a distinct dimension separate from information security. We have examined the mediating role of senior management participation and organizational culture on privacy assimilation (strategy and organizational activities). On the strategy, our findings showed that full mediating role of senior management participation for coercive forces, partial mediation for normative and mimetic forces. On the organizational activities, our findings showed that full mediating role of organizational culture for coercive forces and normative forces, partial mediation for mimetic forces. These findings would enable senior managers to identify and respond to institutional pressures by focusing on appropriate factors within the organization.

Research paper thumbnail of Privacy and Security: An Organization wide DSS Framework

The concept of data privacy (often confused with security), a relatively less focused concept in ... more The concept of data privacy (often confused with security), a relatively less focused concept in the IT industry, is being studied in this research. The complexity surrounding data privacy (compared to security), is often over simplified. Combining the literature and inputs from an exploratory study involving senior managers from business critical domains, we present a comprehensive approach towards managing data privacy in an organization. In this privacy framework, a decision support system assists in the development of appropriate actions for information privacy protection. \ \ Privacy is viewed as a key competitive differentiator for organizations in the current and evolving digital markets. The proposed Decision Support System can incorporate suitable algorithms and approaches to facilitate ‘the exploration of different options for enhancing information privacy’ and ‘choose the best option based on the needs of various business scenarios’. With the rapid evolution of technology and regulations, our proposed DSS can help senior managers, mid-level managers and employees cope with privacy and act as an agent to enhance an organization’s privacy practices

Research paper thumbnail of Business Analytics and Business Value: A Case Study

In the backdrop of growing adoption of business analytics in various business domains, it is impo... more In the backdrop of growing adoption of business analytics in various business domains, it is important for investing firms to understand how business value is created from the investments. Earlier studies conducted in IT domain have highlighted how higher investment in technology may not bring more returns, rather how IT as a capability built by the organization acts as a key mediator in the business value creation. This research extends the model to business analytics, first to identify elements of underlying concepts like analytics technology assets and analytics capability, using a case study approach. This research further captures how analytics resources contribute to business performance by developing suitable operational and organizational measures for performance. This research contributes to the body of knowledge related to business analytics in the form of theory building.

Research paper thumbnail of Cloud Users’ Privacy Concerns in the Indian Healthcare Industry

The growing adoption of Cloud computing in various government and business domain makes it of imp... more The growing adoption of Cloud computing in various government and business domain makes it of importance for users to understand how their information is protected and accounted for in Cloud contracts especially in data sensitive domains such as healthcare. Prior studies have highlighted that contract terms for Cloud computing are evolving based on user's information privacy protective responses and liability is the most negotiated term. There is extant research on individual privacy but very few studies have addressed organizational privacy. This research inductively develops a framework using a multiple case study approach that addresses the following descriptive question-what dimensions constitute an organization's major privacy concerns when exchanging data in the Cloud. The findings from this research will have implications for managers while incorporating penalty clauses in Cloud contracts and informs government in forming privacy regulations suitable for the healthcare sector.

Research paper thumbnail of Information Privacy Assimilation in Organizations - A Neo Institutional Approach

Information privacy at the organizational level is receiving increased attention due to the huge ... more Information privacy at the organizational level is receiving increased attention due to the huge amount of personal information being stored, transmitted across national boundaries, and ownership being shared between organizations due to change in business dynamics. There has been some recent developments in the field of data privacy with several countries enacting or strengthening data protection laws, influencing the organizational privacy policies. However, privacy assimilation is not simple as privacy has multiple aspects. There is a great need for investigating the forces that impact the privacy preserving practices within an organization. To fill this gap, this paper proposes a model based on neo-institutional theory to understand the influencing forces, mediating forces within an organization for information privacy assimilation impelling the business strategies and activities at the organizational level. This model considers privacy as an independent entity and evaluates the...

Research paper thumbnail of Differential Adoption of Cloud Technology: A Multiple Case Study of Large Firms and SMEs

Firms across the industry segments have been exploring cloud computing to derive benefits out of ... more Firms across the industry segments have been exploring cloud computing to derive benefits out of its technological features. Even though literature pertaining to cloud adoption by firms exists, the factors based on cloud-specific characteristics are mostly anecdotal in nature. Following a multiple case study approach, we identify factors specific to cloud technology adoption by firms. We further explain the differential adoption of the cloud between large and small firms. Overall we obtained 11 variables that differentiate large firms and SMEs in their adoption behavior. We further contribute to theory by mapping the extracted variables of cloud adoption to Diffusion of innovation theory (DOI) and Technology organization Environment framework (TOE).

Research paper thumbnail of Impact of personalized review summaries on buying decisions: An experimental study

This study evaluates the impact of personalization of review summaries on consumers’ cognitive ef... more This study evaluates the impact of personalization of review summaries on consumers’ cognitive efforts and buying decision. Following an experimental procedure we tested four hypotheses pertaining to online buyers’ decision process. Our results show that personalized review summary significantly reduces the information processing effort and information requirements of those who received personalized review summaries as compared to those who did not. This study thus contributes to e-commerce literature on online buyer behavior and recommender systems strategy.

Research paper thumbnail of An Empirical Investigation into Understanding the Business Value of Business Analytics

Research paper thumbnail of Understanding Information Privacy Assimilation in IT Organizations using Multi-site Case Studies

Communications of the Association for Information Systems, 2018

We develop a framework for understanding the mechanisms of information privacy assimilation in in... more We develop a framework for understanding the mechanisms of information privacy assimilation in information technology (IT) organizations. Following neo-institutional theory, we develop a broad conceptual model and further build a detailed theory based on a multi-site, multi-case study of 18 organizations. We treat information privacy as a distinct dimension separate from information security. As in the case of information security, senior management support emerged as a mediator between the external influences of coercive, mimetic, and normative forces and information privacy assimilation. Privacy capability emerged as a distinct construct that had a moderating effect on the influence of coercive and normative forces on privacy assimilation. Similarly, cultural acceptability also moderated the effect of external forces on privacy assimilation. We produce a theoretical model that future research can empirically test. The findings would enable senior managers identify and respond to institutional pressures by focusing on appropriate factors in the organizations.

Research paper thumbnail of Vendor Risks in Remote Infrastructure Management Services

Global Sourcing of Services, 2016

Remote Infrastructure Management Services (RIMS) is a fast growing service in IT which has been o... more Remote Infrastructure Management Services (RIMS) is a fast growing service in IT which has been outsourced to third party service providers by leading global firms. Service providers in this line face huge challenges because they have to ensure agreed upon service levels by monitoring and controlling the client’s infrastructure from an offshore location. This chapter explores the relatively nascent area of RIMS to identify and categorize service provider risks. The three categories of risks that emerged from this analysis are: (i) service delivery risks, (ii) relationship specific risks, and (iii) macroeconomic risks. There is a close relationship between the first two categories of risks and similar categories of risks in application development. However, dimensions of timeline and requirements uncertainty elicit a different set of risks in RIMS. Relationship maturity, nature of client, contract design, and nature of service are contextual factors which influence the degree of risks in RIMS.

Research paper thumbnail of Global Sourcing of Services

Research paper thumbnail of Web personalization for user acceptance of technology: An empirical investigation of E-government services

Information Systems Frontiers, 2015

E-Commerce firms have adopted Web Personalization techniques extensively in the form of recommend... more E-Commerce firms have adopted Web Personalization techniques extensively in the form of recommender systems for influencing user behavior for customer retention. Although there are numerous studies in this area, academic research addressing the role of Web Personalization in user acceptance of technology is very scant. Further, owing to the potential of recommender systems to attract and retain customers, most studies in web personalization have been done in E-Commerce setting. In this research, the 'Consumer Acceptance and Use of Information Technology' theory proposed in previous research has been extended to include web personalization as a moderator and has been tested in an E-Government context. Data collection involved conducting a laboratory experiment with the treatment group receiving personalized web forms for requesting an E-Government service. Our analyses show that personalizing the Web by selfreference and content relevance has a significant moderator role in influencing the relationship between determinants of intention to use and behavioral intention in certain cases.

Research paper thumbnail of Web personalization in technology acceptance

2012 4th International Conference on Intelligent Human Computer Interaction (IHCI), 2012

ABSTRACT This paper studies the role of web personalization in technology acceptance in consumer ... more ABSTRACT This paper studies the role of web personalization in technology acceptance in consumer context. Web personalization has been extensively studied in various research streams. We try to study the effect of web personalization in context of technology acceptance. Most previous studies on web personalization have focused on e-commerce. We choose our domain of study as E Governance which has received much less research attention, particularly on user behavior and web personalization. We use Consumer Acceptance and use of Information Technology (UTAUT2) as the model to study consumer acceptance of an online government service channel. We follow a randomized experimental design to test how web personalization moderates the impact of performance expectancy, effort expectancy, facilitating conditions, hedonic motivation, price and habit on consumer's intention to use a technology.

Research paper thumbnail of Impact of ICT Infrastructure Capability on E-Governance Performance: Proposing an Analytical Framework

Advances in Intelligent Systems and Computing, 2015

ABSTRACT The impact of IT infrastructure capability on the performance of a firm has been address... more ABSTRACT The impact of IT infrastructure capability on the performance of a firm has been addressed quite sufficiently in the past literature but how these factors when coupled together to study the impact on E-Governance performance is yet to garner the main focus of attention. Effective E-Government readiness is characterised by efficient deployment of ICT infrastructure capability and the same has been recognized worldwide in the various studies on E-Government. A two phased study was proposed to meet the objectives defined for this research. This paper describes the work completed in the first phase. In the first phase of the study, an exploratory study was conducted to identify, articulate and contextualize variables extracted from literature survey and field survey. Finally, based on the exploratory study, the author’s work lays the groundwork for the development of a conceptual framework along with suggested methodology for understanding how ICT infrastructure capability affects E-Governance performance and direction for future work.

Research paper thumbnail of Mark-Down Pricing

International Journal of Information Systems in the Service Sector, 2012

Discount sales have been increasing in Indian retailing due to the growing competition in the sec... more Discount sales have been increasing in Indian retailing due to the growing competition in the sector. In this research the authors analyze the data of a fashion retail store to study the effect of mark-down pricing on the sales. Their store level analysis shows that mark-downs have a positive impact on sales in an aggregate level. At a style level, however, some items showed a negative and significant effect on sales. This negative influence is explained by the predominant focus of the Store to attract high end customers characterized by conspicuous consumption.

Research paper thumbnail of Mitigation of risks due to service provider behavior in offshore software development

Strategic Outsourcing: An International Journal, 2011

PurposeAlthough risks and client‐vendor relationships in IT outsourcing have been studied in prio... more PurposeAlthough risks and client‐vendor relationships in IT outsourcing have been studied in prior research, there is a paucity of studies providing insights on the mitigation of client risks through the relationship. This research aims to focus on mitigation of the ex post risks of firms engaged in offshore software development (OSD). Client risks due to service provider behavior are identified first. Further, this work seeks to identify relationship variables that could reduce the impact of determinants of risk on a risk category.Design/methodology/approachThis research followed a multiple case study method aiming to build insights and directions that would facilitate further research. The paper's goal of sampling was to choose cases which were likely to extend the emergent theory pertaining to risks and their mitigation through relationships.FindingsFindings from this study show that shirking, loss of control over information assets, and service provider lock‐in are the three...

Research paper thumbnail of Web personalization research: an information systems perspective

Journal of Systems and Information Technology, 2013

Purpose-Web personalization has been studied in different streams of research such as Marketing, ... more Purpose-Web personalization has been studied in different streams of research such as Marketing, Human Computer Interaction and Computer Science. However, an information systems perspective of web personalization research is very scarcely visible in this body of knowledge. This research review seeks to address two important questions: how has web personalization evolved as an integrative discipline? How has web personalization been treated in IS literature and where should researchers focus next? Design/methodology/approach-The paper intently follows an information systems perspective in its thematic classification of web personalization research which is consistent with the early conceptualization of information systems by logically mapping IS categories into web personalization research streams. Articles from 100 þ journals were analyzed and important concepts related to web personalization were classified from an information systems perspective. Findings-Surrounding the theme of web personalization two parallel streams of research evolved. First stream consisted of internet business models, computer science algorithms and web mining. Second stream focussed on human computer Interaction studies, user modelling and targeted marketing. Future information systems researchers in web personalization must focus on four important areas of social media, web development methodologies, emerging Internet accessing gadgets and domains other than e-Commerce. Originality/value-Web personalization has been studied previously in separate research streams. But no integrated view from different research streams exists. Although research interest in web mining has been growing as evidenced by growing number of publications an information systems perspective of web personalization research is very scarcely visible in the body of knowledge. The authors intently follow an information systems perspective in their thematic classification of web personalization research which is consistent with the early conceptualization of information systems by logically mapping IS categories into web personalization research streams. This thematic segregation of different research streams into IS framework makes our study distinct from other early reviews. They also identify four important areas where future IS researchers should focus on.

Research paper thumbnail of Achieving offshore software development success: An empirical analysis of risk mitigation through relational norms

The Journal of Strategic Information Systems, 2013

Behavioral risks such as shirking and misappropriation of information assets are more prominent i... more Behavioral risks such as shirking and misappropriation of information assets are more prominent in offshore software development context and could adversely affect offshore outsourcing success. This paper studies the moderating effects of different relational norms on the link between behavioral risks and offshore software development success. We focused on three major modes of relational norms: norm of flexibility, norm of solidarity and norm of information exchange. Using PLS path modeling to test a sample of 40 US corporations engaged in offshore software development, we found that the norms of solidarity and flexibility reduced the negative effects shirking risk on offshore software development success. Our results suggest that client firms shall benefit by forming the right mode of relational norms to achieve offshore success.