Detmar Straub | Temple University (original) (raw)

Papers by Detmar Straub

Research paper thumbnail of The critical importance of construct measurement specification: a response to Aguirre-Urreta and Marakas

Management Information Systems …, 2012

Aguirre-Urreta and Marakas (A&M) suggest in their simulation" Revisiting Bias Due to Constru... more Aguirre-Urreta and Marakas (A&M) suggest in their simulation" Revisiting Bias Due to Construct Misspecification: Different Results from Considering Coefficients in Standardized Form," that, like Jarvis et al.(2003), MacKenzie et al.(2005), and Petter et al.( ...

Research paper thumbnail of Coping with Systems Risk

Research paper thumbnail of Transfer of Information Technology to the Arab World: A Test of Cultural Influence Modeling

INTRODUCTIONOrganizations throughout the world experience difficultyand even failure in informati... more INTRODUCTIONOrganizations throughout the world experience difficultyand even failure in information technology transfer(ITT), defined as the movement of information technologyfrom creators to users (Cunningham & Srayrah, 1994). Thistransference of systems, whether they are developed internallyor purchased in the commercial software/ hardwaremarketplace, is plagued with problems (Kwon & Zmud,1987).The ITT problem is even more acute in developingcountries, such as the emerging...

Research paper thumbnail of Coping With Systems Risk: Security Planning Models for Management Decision Making

Management Information Systems Quarterly, 1998

The likelihood that the firm's information systems are insufficiently protected against certain k... more The likelihood that the firm's information systems are insufficiently protected against certain kinds of damage or loss is known as "systems risk." Risk can be managed or reduced when managers are aware of the full range of controls available and implement the most effective controls. Unfortunately, they often lack this knowledge and their subsequent actions to cope with systems risk are less effective than they might otherwise be. This is one viable explanation for why losses from computer abuse and computer disasters today are uncomfortably large and still so potentially devastating after many years of attempting to deal with the problem. Results of comparative qualitative studies in two information services Fortune 500 firms identify an approach that can effectively deal with the problem. This theory-based security program includes: (1) use of a security risk planning model, (2) education/training in security awareness, and (3) Countermeasure Matrix analysis. abroad, the Local Government Audit Inspectorate (1981). Estimates of annual losses vary, but some set losses at between 500millionand500 million and 500millionand5 billion per year in the U.S. alone . If anything, losses have become even more serious as time goes on .

Research paper thumbnail of Transfering Technology to the Developing World

Research paper thumbnail of A PRACTICAL GUIDE TO FACTORIAL VALIDITY USING PLS-GRAPH: TUTORIAL AND ANNOTATED EXAMPLE

Communications of The Ais, 2005

This tutorial explains in detail what factorial validity is and how to run its various aspects in... more This tutorial explains in detail what factorial validity is and how to run its various aspects in PLS. The tutorial is written as a teaching aid for doctoral seminars that may cover PLS and for researchers interested in learning PLS. An annotated example with data is provided as an additional tool to assist the reader in reconstructing the detailed example.

Research paper thumbnail of Measuring e-Commerce in Net-Enabled Organizations: An Introduction to the Special Issue

Information Systems Research, 2002

Abstract Clear and precise metrics are essential for evaluating phenomena such as e-commerce (“Ne... more Abstract Clear and precise metrics are essential for evaluating phenomena such as e-commerce (“Net”-enablement) and the organizational use of networks and the Internet for commercial activities. Researchers require them for theory building and testing; practitioners require them for improving organizational processes. But for IS professionals to engage in the serious creation of metrics, it is critical to recognize:(1) that the phenomenon of net-enablement is an enduring change, probably led in the future by “brick-cum-click” firms,(2) ...

Research paper thumbnail of A conceptual investigation of the e-commerce industry

Communications of The ACM, 2000

Research paper thumbnail of Trust and TAM in Online Shopping: An Integrated Model

Management Information Systems Quarterly, 2003

This article reports the findings of a longitudinal study of temporary virtual teams and explores... more This article reports the findings of a longitudinal study of temporary virtual teams and explores the role of behavior control on trust decline. We conducted an experiment involving 51 temporary virtual teams. Half of the teams were required to comply with behavior control mechanisms traditionally used in colocated teams. Their counterparts were allowed to self-direct. 1 Cynthia Beath was the accepting senior editor for this paper.

Research paper thumbnail of Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs

Management Information Systems Quarterly, 1999

This distinction is crucial in understanding and managing this process over time. The current stu... more This distinction is crucial in understanding and managing this process over time. The current study combines innovation diffusion and attitude theories in a theoretical framework to examine differences in pre-adoption and post-adoption beliefs and attitudes.

Research paper thumbnail of Measuring System Usage: Implications for IS Theory Testing

There is widespread agreement among researchers that system usage, defined as the utilization of ... more There is widespread agreement among researchers that system usage, defined as the utilization of information technology (IT) by individuals, groups, or organizations, is the primary variable through which IT affects white collar performance. Despite the number of studies targeted at explaining system usage, there are crucial differences in the way the variable has been conceptualized and operationalized. This wide variation

Research paper thumbnail of Research Commentary: Transformational Issues in Researching IS and Net-Enabled Organizations

Information Systems Research, 2001

Abstract The conduct of net-enabled business, known variously as electronic commerce (EC) or e-Bu... more Abstract The conduct of net-enabled business, known variously as electronic commerce (EC) or e-Business, has changed the landscape and opportunities for IS research by shifting the focus from internal to customer/partnering systems. The article examines the two primary dyadic net-enabled relationships in the marketplace: B2C and B2B. It also considers issues that extend beyond these two relationships. B2C practice and research are analyzed from:(1) consumer,(2) service, and (3) risk perspectives. Three central issues of B2B or ...

Research paper thumbnail of NSF Project Summary: IT Transfer to Egypt: A Process Model for Developing Countries

ABSTRACT ion, and domain analysis. The sample includes users of urban and rural information cente... more ABSTRACT ion, and domain analysis. The sample includes users of urban and rural information centers, users of cybercafes, Internet Service Providers (ISP) and their subscribers. Questionnaires will be administered to private and public sector knowledge workers. Current national IT policy documents will be gathered and coded based on Gurbaxani's theoretical framework, and IT policy makers and parties affected by IT policy will be interviewed. Our study is unique in that it: (1) focuses on the complex socio-cultural construct, extending previous research in this line of inquiry; (2) combines qualitative and quantitative methodolgies; (3) links national economic development policies and their impact on ITT, and (4) is empirical, moving beyond frameworks and propositions to offer tangible insight into the dynamic relationship between culture values, policies, implementation factors and ITT. The study has implications for research and practice. From a research perspective, this study specifically r

Research paper thumbnail of Toward New Metrics for Net-Enhanced Organizations

Information Systems Research - ISR, 2002

Abstract Metrics are sine qua non for solid research, and scientific metrics have now been advanc... more Abstract Metrics are sine qua non for solid research, and scientific metrics have now been advanced with new approaches in the arena of Net-enablement (NE), otherwise known as e-commerce. Questions that likely require additional attention include:(1) Where/what is the real value in substituting information for physical processes?,(2) which NE systems effectively support end-to-end fulfillment?, and (3) when should a Net-enabled organization share information? With respect to extant studies in Net-enhancement, the field has been ...

Research paper thumbnail of The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption

Journal of The Ais - JAIS, 2000

The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption... more The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption. According to TAM, IT adoption is influenced by two perceptions: usefulness and ease-of-use. Research has shown that perceived usefulness (PU) affects intended adoption of IT, but has mostly failed to do so regarding perceived ease of use (PEOU). The basic proposition of this study is that this varying importance of PEOU may be related to the nature of the task. PEOU relates to assessments of the intrinsic characteristics of IT, such as the ease of use, ease of learning, flexibility, and clarity of its interface. PU, on the other hand, is a response to user assessment of its extrinsic, i.e., task-oriented, outcomes: how IT helps users achieve task-related objectives, such as task efficiency and effectiveness. Accordingly, the study theorizes that PEOU directly affects IT adoption only when the primary task for which the IT is deployed is directly associated with intrinsic IT characteris...

Research paper thumbnail of Going Global: Using information technology to advance the competitiveness of the virtual transnational organization

Academy of Management Perspectives, 1998

... Allergan Pharmaceuticals also uses temporary global teams throughout its orga-nization, impro... more ... Allergan Pharmaceuticals also uses temporary global teams throughout its orga-nization, improving time-to-market for new prod-ucts and creating effective marketing strategies for its customers around the world. ... Groupware Global teams are becoming more common. ...

Research paper thumbnail of Common Beliefs and Reality About PLS: Comments on Ronkko and Evermann (2013)

Organizational Research Methods, 2014

This article addresses Rö nkkö and Evermann's criticisms of the partial least squares (PLS) appro... more This article addresses Rö nkkö and Evermann's criticisms of the partial least squares (PLS) approach to structural equation modeling. We contend that the alleged shortcomings of PLS are not due to problems with the technique, but instead to three problems with Rönkkö and Evermann's study: (a) the adherence to the common factor model, (b) a very limited simulation designs, and (c) overstretched generalizations of their findings. Whereas Rö nkkö and Evermann claim to be dispelling myths about PLS, they have in reality created new myths that we, in turn, debunk. By examining their claims, our article contributes to reestablishing a constructive discussion of the PLS method and its properties. We show that PLS does offer advantages for exploratory research and that it is a viable estimator for composite factor models. This can pose an interesting alternative if the common factor model does not hold. Therefore, we can conclude that PLS should continue to be used as an important statistical tool for management and organizational research, as well as other social science disciplines.

Research paper thumbnail of Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model

MIS Quarterly, 1997

University and a Master of Sciences from Tel-Aviv University. Before entering academia, he spent ... more University and a Master of Sciences from Tel-Aviv University. Before entering academia, he spent 12 years developing and managing large information systems, including the ongoing management of a state-of-the-art logistics system. His research specializations are: IS adoption, the Internet and Electronic Commerce, culture and gender effects, software maintenance, and trust. He won the second best conference place award for the 1996 Academy of Management Printed Papers Proceeding and has published in the IEEE Conference on Software Maintenance and ABSTRACT This study extends Davis' (1989) TAM model and Straub's (1994) SPIR addendum by adding gender to an IT diffusion model. The Technology Acceptance Model (TAM) has been widely studied in IS research as an explanation of the use of information systems across IS-types and nationalities. While this line of research has found significant cross-cultural differences, it has ignored the effects of gender, even though in socio-linguistic research, gender is a fundamental aspect of culture. Indeed, sociolinguistic research that has shown that men tend to focus discourse on hierarchy and independence while women focus on intimacy and solidarity. This literature provides a solid grounding for conceptual extensions to the IT diffusion research and the Technology Acceptance Model.

Research paper thumbnail of Validation in Information Systems Research: A State-of-the-Art Assessment

Research paper thumbnail of A model academic Integrated Information Center

Journal of the American Society for Information Science, 1991

Based on the results of the information and technology requirements assessments, three configurat... more Based on the results of the information and technology requirements assessments, three configurations for the model IIC were developed—a basic model, an intermediate model, and an advanced model. These configurations of the model IIC represent increasing numbers and ...

Research paper thumbnail of The critical importance of construct measurement specification: a response to Aguirre-Urreta and Marakas

Management Information Systems …, 2012

Aguirre-Urreta and Marakas (A&M) suggest in their simulation" Revisiting Bias Due to Constru... more Aguirre-Urreta and Marakas (A&M) suggest in their simulation" Revisiting Bias Due to Construct Misspecification: Different Results from Considering Coefficients in Standardized Form," that, like Jarvis et al.(2003), MacKenzie et al.(2005), and Petter et al.( ...

Research paper thumbnail of Coping with Systems Risk

Research paper thumbnail of Transfer of Information Technology to the Arab World: A Test of Cultural Influence Modeling

INTRODUCTIONOrganizations throughout the world experience difficultyand even failure in informati... more INTRODUCTIONOrganizations throughout the world experience difficultyand even failure in information technology transfer(ITT), defined as the movement of information technologyfrom creators to users (Cunningham & Srayrah, 1994). Thistransference of systems, whether they are developed internallyor purchased in the commercial software/ hardwaremarketplace, is plagued with problems (Kwon & Zmud,1987).The ITT problem is even more acute in developingcountries, such as the emerging...

Research paper thumbnail of Coping With Systems Risk: Security Planning Models for Management Decision Making

Management Information Systems Quarterly, 1998

The likelihood that the firm's information systems are insufficiently protected against certain k... more The likelihood that the firm's information systems are insufficiently protected against certain kinds of damage or loss is known as "systems risk." Risk can be managed or reduced when managers are aware of the full range of controls available and implement the most effective controls. Unfortunately, they often lack this knowledge and their subsequent actions to cope with systems risk are less effective than they might otherwise be. This is one viable explanation for why losses from computer abuse and computer disasters today are uncomfortably large and still so potentially devastating after many years of attempting to deal with the problem. Results of comparative qualitative studies in two information services Fortune 500 firms identify an approach that can effectively deal with the problem. This theory-based security program includes: (1) use of a security risk planning model, (2) education/training in security awareness, and (3) Countermeasure Matrix analysis. abroad, the Local Government Audit Inspectorate (1981). Estimates of annual losses vary, but some set losses at between 500millionand500 million and 500millionand5 billion per year in the U.S. alone . If anything, losses have become even more serious as time goes on .

Research paper thumbnail of Transfering Technology to the Developing World

Research paper thumbnail of A PRACTICAL GUIDE TO FACTORIAL VALIDITY USING PLS-GRAPH: TUTORIAL AND ANNOTATED EXAMPLE

Communications of The Ais, 2005

This tutorial explains in detail what factorial validity is and how to run its various aspects in... more This tutorial explains in detail what factorial validity is and how to run its various aspects in PLS. The tutorial is written as a teaching aid for doctoral seminars that may cover PLS and for researchers interested in learning PLS. An annotated example with data is provided as an additional tool to assist the reader in reconstructing the detailed example.

Research paper thumbnail of Measuring e-Commerce in Net-Enabled Organizations: An Introduction to the Special Issue

Information Systems Research, 2002

Abstract Clear and precise metrics are essential for evaluating phenomena such as e-commerce (“Ne... more Abstract Clear and precise metrics are essential for evaluating phenomena such as e-commerce (“Net”-enablement) and the organizational use of networks and the Internet for commercial activities. Researchers require them for theory building and testing; practitioners require them for improving organizational processes. But for IS professionals to engage in the serious creation of metrics, it is critical to recognize:(1) that the phenomenon of net-enablement is an enduring change, probably led in the future by “brick-cum-click” firms,(2) ...

Research paper thumbnail of A conceptual investigation of the e-commerce industry

Communications of The ACM, 2000

Research paper thumbnail of Trust and TAM in Online Shopping: An Integrated Model

Management Information Systems Quarterly, 2003

This article reports the findings of a longitudinal study of temporary virtual teams and explores... more This article reports the findings of a longitudinal study of temporary virtual teams and explores the role of behavior control on trust decline. We conducted an experiment involving 51 temporary virtual teams. Half of the teams were required to comply with behavior control mechanisms traditionally used in colocated teams. Their counterparts were allowed to self-direct. 1 Cynthia Beath was the accepting senior editor for this paper.

Research paper thumbnail of Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs

Management Information Systems Quarterly, 1999

This distinction is crucial in understanding and managing this process over time. The current stu... more This distinction is crucial in understanding and managing this process over time. The current study combines innovation diffusion and attitude theories in a theoretical framework to examine differences in pre-adoption and post-adoption beliefs and attitudes.

Research paper thumbnail of Measuring System Usage: Implications for IS Theory Testing

There is widespread agreement among researchers that system usage, defined as the utilization of ... more There is widespread agreement among researchers that system usage, defined as the utilization of information technology (IT) by individuals, groups, or organizations, is the primary variable through which IT affects white collar performance. Despite the number of studies targeted at explaining system usage, there are crucial differences in the way the variable has been conceptualized and operationalized. This wide variation

Research paper thumbnail of Research Commentary: Transformational Issues in Researching IS and Net-Enabled Organizations

Information Systems Research, 2001

Abstract The conduct of net-enabled business, known variously as electronic commerce (EC) or e-Bu... more Abstract The conduct of net-enabled business, known variously as electronic commerce (EC) or e-Business, has changed the landscape and opportunities for IS research by shifting the focus from internal to customer/partnering systems. The article examines the two primary dyadic net-enabled relationships in the marketplace: B2C and B2B. It also considers issues that extend beyond these two relationships. B2C practice and research are analyzed from:(1) consumer,(2) service, and (3) risk perspectives. Three central issues of B2B or ...

Research paper thumbnail of NSF Project Summary: IT Transfer to Egypt: A Process Model for Developing Countries

ABSTRACT ion, and domain analysis. The sample includes users of urban and rural information cente... more ABSTRACT ion, and domain analysis. The sample includes users of urban and rural information centers, users of cybercafes, Internet Service Providers (ISP) and their subscribers. Questionnaires will be administered to private and public sector knowledge workers. Current national IT policy documents will be gathered and coded based on Gurbaxani's theoretical framework, and IT policy makers and parties affected by IT policy will be interviewed. Our study is unique in that it: (1) focuses on the complex socio-cultural construct, extending previous research in this line of inquiry; (2) combines qualitative and quantitative methodolgies; (3) links national economic development policies and their impact on ITT, and (4) is empirical, moving beyond frameworks and propositions to offer tangible insight into the dynamic relationship between culture values, policies, implementation factors and ITT. The study has implications for research and practice. From a research perspective, this study specifically r

Research paper thumbnail of Toward New Metrics for Net-Enhanced Organizations

Information Systems Research - ISR, 2002

Abstract Metrics are sine qua non for solid research, and scientific metrics have now been advanc... more Abstract Metrics are sine qua non for solid research, and scientific metrics have now been advanced with new approaches in the arena of Net-enablement (NE), otherwise known as e-commerce. Questions that likely require additional attention include:(1) Where/what is the real value in substituting information for physical processes?,(2) which NE systems effectively support end-to-end fulfillment?, and (3) when should a Net-enabled organization share information? With respect to extant studies in Net-enhancement, the field has been ...

Research paper thumbnail of The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption

Journal of The Ais - JAIS, 2000

The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption... more The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption. According to TAM, IT adoption is influenced by two perceptions: usefulness and ease-of-use. Research has shown that perceived usefulness (PU) affects intended adoption of IT, but has mostly failed to do so regarding perceived ease of use (PEOU). The basic proposition of this study is that this varying importance of PEOU may be related to the nature of the task. PEOU relates to assessments of the intrinsic characteristics of IT, such as the ease of use, ease of learning, flexibility, and clarity of its interface. PU, on the other hand, is a response to user assessment of its extrinsic, i.e., task-oriented, outcomes: how IT helps users achieve task-related objectives, such as task efficiency and effectiveness. Accordingly, the study theorizes that PEOU directly affects IT adoption only when the primary task for which the IT is deployed is directly associated with intrinsic IT characteris...

Research paper thumbnail of Going Global: Using information technology to advance the competitiveness of the virtual transnational organization

Academy of Management Perspectives, 1998

... Allergan Pharmaceuticals also uses temporary global teams throughout its orga-nization, impro... more ... Allergan Pharmaceuticals also uses temporary global teams throughout its orga-nization, improving time-to-market for new prod-ucts and creating effective marketing strategies for its customers around the world. ... Groupware Global teams are becoming more common. ...

Research paper thumbnail of Common Beliefs and Reality About PLS: Comments on Ronkko and Evermann (2013)

Organizational Research Methods, 2014

This article addresses Rö nkkö and Evermann's criticisms of the partial least squares (PLS) appro... more This article addresses Rö nkkö and Evermann's criticisms of the partial least squares (PLS) approach to structural equation modeling. We contend that the alleged shortcomings of PLS are not due to problems with the technique, but instead to three problems with Rönkkö and Evermann's study: (a) the adherence to the common factor model, (b) a very limited simulation designs, and (c) overstretched generalizations of their findings. Whereas Rö nkkö and Evermann claim to be dispelling myths about PLS, they have in reality created new myths that we, in turn, debunk. By examining their claims, our article contributes to reestablishing a constructive discussion of the PLS method and its properties. We show that PLS does offer advantages for exploratory research and that it is a viable estimator for composite factor models. This can pose an interesting alternative if the common factor model does not hold. Therefore, we can conclude that PLS should continue to be used as an important statistical tool for management and organizational research, as well as other social science disciplines.

Research paper thumbnail of Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model

MIS Quarterly, 1997

University and a Master of Sciences from Tel-Aviv University. Before entering academia, he spent ... more University and a Master of Sciences from Tel-Aviv University. Before entering academia, he spent 12 years developing and managing large information systems, including the ongoing management of a state-of-the-art logistics system. His research specializations are: IS adoption, the Internet and Electronic Commerce, culture and gender effects, software maintenance, and trust. He won the second best conference place award for the 1996 Academy of Management Printed Papers Proceeding and has published in the IEEE Conference on Software Maintenance and ABSTRACT This study extends Davis' (1989) TAM model and Straub's (1994) SPIR addendum by adding gender to an IT diffusion model. The Technology Acceptance Model (TAM) has been widely studied in IS research as an explanation of the use of information systems across IS-types and nationalities. While this line of research has found significant cross-cultural differences, it has ignored the effects of gender, even though in socio-linguistic research, gender is a fundamental aspect of culture. Indeed, sociolinguistic research that has shown that men tend to focus discourse on hierarchy and independence while women focus on intimacy and solidarity. This literature provides a solid grounding for conceptual extensions to the IT diffusion research and the Technology Acceptance Model.

Research paper thumbnail of Validation in Information Systems Research: A State-of-the-Art Assessment

Research paper thumbnail of A model academic Integrated Information Center

Journal of the American Society for Information Science, 1991

Based on the results of the information and technology requirements assessments, three configurat... more Based on the results of the information and technology requirements assessments, three configurations for the model IIC were developed—a basic model, an intermediate model, and an advanced model. These configurations of the model IIC represent increasing numbers and ...