Detmar Straub | Temple University (original) (raw)
Papers by Detmar Straub
Management Information Systems …, 2012
Aguirre-Urreta and Marakas (A&M) suggest in their simulation" Revisiting Bias Due to Constru... more Aguirre-Urreta and Marakas (A&M) suggest in their simulation" Revisiting Bias Due to Construct Misspecification: Different Results from Considering Coefficients in Standardized Form," that, like Jarvis et al.(2003), MacKenzie et al.(2005), and Petter et al.( ...
INTRODUCTIONOrganizations throughout the world experience difficultyand even failure in informati... more INTRODUCTIONOrganizations throughout the world experience difficultyand even failure in information technology transfer(ITT), defined as the movement of information technologyfrom creators to users (Cunningham & Srayrah, 1994). Thistransference of systems, whether they are developed internallyor purchased in the commercial software/ hardwaremarketplace, is plagued with problems (Kwon & Zmud,1987).The ITT problem is even more acute in developingcountries, such as the emerging...
Management Information Systems Quarterly, 1998
The likelihood that the firm's information systems are insufficiently protected against certain k... more The likelihood that the firm's information systems are insufficiently protected against certain kinds of damage or loss is known as "systems risk." Risk can be managed or reduced when managers are aware of the full range of controls available and implement the most effective controls. Unfortunately, they often lack this knowledge and their subsequent actions to cope with systems risk are less effective than they might otherwise be. This is one viable explanation for why losses from computer abuse and computer disasters today are uncomfortably large and still so potentially devastating after many years of attempting to deal with the problem. Results of comparative qualitative studies in two information services Fortune 500 firms identify an approach that can effectively deal with the problem. This theory-based security program includes: (1) use of a security risk planning model, (2) education/training in security awareness, and (3) Countermeasure Matrix analysis. abroad, the Local Government Audit Inspectorate (1981). Estimates of annual losses vary, but some set losses at between 500millionand500 million and 500millionand5 billion per year in the U.S. alone . If anything, losses have become even more serious as time goes on .
Communications of The Ais, 2005
This tutorial explains in detail what factorial validity is and how to run its various aspects in... more This tutorial explains in detail what factorial validity is and how to run its various aspects in PLS. The tutorial is written as a teaching aid for doctoral seminars that may cover PLS and for researchers interested in learning PLS. An annotated example with data is provided as an additional tool to assist the reader in reconstructing the detailed example.
Information Systems Research, 2002
Abstract Clear and precise metrics are essential for evaluating phenomena such as e-commerce (“Ne... more Abstract Clear and precise metrics are essential for evaluating phenomena such as e-commerce (“Net”-enablement) and the organizational use of networks and the Internet for commercial activities. Researchers require them for theory building and testing; practitioners require them for improving organizational processes. But for IS professionals to engage in the serious creation of metrics, it is critical to recognize:(1) that the phenomenon of net-enablement is an enduring change, probably led in the future by “brick-cum-click” firms,(2) ...
Communications of The ACM, 2000
Management Information Systems Quarterly, 2003
This article reports the findings of a longitudinal study of temporary virtual teams and explores... more This article reports the findings of a longitudinal study of temporary virtual teams and explores the role of behavior control on trust decline. We conducted an experiment involving 51 temporary virtual teams. Half of the teams were required to comply with behavior control mechanisms traditionally used in colocated teams. Their counterparts were allowed to self-direct. 1 Cynthia Beath was the accepting senior editor for this paper.
Management Information Systems Quarterly, 1999
This distinction is crucial in understanding and managing this process over time. The current stu... more This distinction is crucial in understanding and managing this process over time. The current study combines innovation diffusion and attitude theories in a theoretical framework to examine differences in pre-adoption and post-adoption beliefs and attitudes.
There is widespread agreement among researchers that system usage, defined as the utilization of ... more There is widespread agreement among researchers that system usage, defined as the utilization of information technology (IT) by individuals, groups, or organizations, is the primary variable through which IT affects white collar performance. Despite the number of studies targeted at explaining system usage, there are crucial differences in the way the variable has been conceptualized and operationalized. This wide variation
Information Systems Research, 2001
Abstract The conduct of net-enabled business, known variously as electronic commerce (EC) or e-Bu... more Abstract The conduct of net-enabled business, known variously as electronic commerce (EC) or e-Business, has changed the landscape and opportunities for IS research by shifting the focus from internal to customer/partnering systems. The article examines the two primary dyadic net-enabled relationships in the marketplace: B2C and B2B. It also considers issues that extend beyond these two relationships. B2C practice and research are analyzed from:(1) consumer,(2) service, and (3) risk perspectives. Three central issues of B2B or ...
ABSTRACT ion, and domain analysis. The sample includes users of urban and rural information cente... more ABSTRACT ion, and domain analysis. The sample includes users of urban and rural information centers, users of cybercafes, Internet Service Providers (ISP) and their subscribers. Questionnaires will be administered to private and public sector knowledge workers. Current national IT policy documents will be gathered and coded based on Gurbaxani's theoretical framework, and IT policy makers and parties affected by IT policy will be interviewed. Our study is unique in that it: (1) focuses on the complex socio-cultural construct, extending previous research in this line of inquiry; (2) combines qualitative and quantitative methodolgies; (3) links national economic development policies and their impact on ITT, and (4) is empirical, moving beyond frameworks and propositions to offer tangible insight into the dynamic relationship between culture values, policies, implementation factors and ITT. The study has implications for research and practice. From a research perspective, this study specifically r
Information Systems Research - ISR, 2002
Abstract Metrics are sine qua non for solid research, and scientific metrics have now been advanc... more Abstract Metrics are sine qua non for solid research, and scientific metrics have now been advanced with new approaches in the arena of Net-enablement (NE), otherwise known as e-commerce. Questions that likely require additional attention include:(1) Where/what is the real value in substituting information for physical processes?,(2) which NE systems effectively support end-to-end fulfillment?, and (3) when should a Net-enabled organization share information? With respect to extant studies in Net-enhancement, the field has been ...
Journal of The Ais - JAIS, 2000
The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption... more The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption. According to TAM, IT adoption is influenced by two perceptions: usefulness and ease-of-use. Research has shown that perceived usefulness (PU) affects intended adoption of IT, but has mostly failed to do so regarding perceived ease of use (PEOU). The basic proposition of this study is that this varying importance of PEOU may be related to the nature of the task. PEOU relates to assessments of the intrinsic characteristics of IT, such as the ease of use, ease of learning, flexibility, and clarity of its interface. PU, on the other hand, is a response to user assessment of its extrinsic, i.e., task-oriented, outcomes: how IT helps users achieve task-related objectives, such as task efficiency and effectiveness. Accordingly, the study theorizes that PEOU directly affects IT adoption only when the primary task for which the IT is deployed is directly associated with intrinsic IT characteris...
Academy of Management Perspectives, 1998
... Allergan Pharmaceuticals also uses temporary global teams throughout its orga-nization, impro... more ... Allergan Pharmaceuticals also uses temporary global teams throughout its orga-nization, improving time-to-market for new prod-ucts and creating effective marketing strategies for its customers around the world. ... Groupware Global teams are becoming more common. ...
Organizational Research Methods, 2014
This article addresses Rö nkkö and Evermann's criticisms of the partial least squares (PLS) appro... more This article addresses Rö nkkö and Evermann's criticisms of the partial least squares (PLS) approach to structural equation modeling. We contend that the alleged shortcomings of PLS are not due to problems with the technique, but instead to three problems with Rönkkö and Evermann's study: (a) the adherence to the common factor model, (b) a very limited simulation designs, and (c) overstretched generalizations of their findings. Whereas Rö nkkö and Evermann claim to be dispelling myths about PLS, they have in reality created new myths that we, in turn, debunk. By examining their claims, our article contributes to reestablishing a constructive discussion of the PLS method and its properties. We show that PLS does offer advantages for exploratory research and that it is a viable estimator for composite factor models. This can pose an interesting alternative if the common factor model does not hold. Therefore, we can conclude that PLS should continue to be used as an important statistical tool for management and organizational research, as well as other social science disciplines.
MIS Quarterly, 1997
University and a Master of Sciences from Tel-Aviv University. Before entering academia, he spent ... more University and a Master of Sciences from Tel-Aviv University. Before entering academia, he spent 12 years developing and managing large information systems, including the ongoing management of a state-of-the-art logistics system. His research specializations are: IS adoption, the Internet and Electronic Commerce, culture and gender effects, software maintenance, and trust. He won the second best conference place award for the 1996 Academy of Management Printed Papers Proceeding and has published in the IEEE Conference on Software Maintenance and ABSTRACT This study extends Davis' (1989) TAM model and Straub's (1994) SPIR addendum by adding gender to an IT diffusion model. The Technology Acceptance Model (TAM) has been widely studied in IS research as an explanation of the use of information systems across IS-types and nationalities. While this line of research has found significant cross-cultural differences, it has ignored the effects of gender, even though in socio-linguistic research, gender is a fundamental aspect of culture. Indeed, sociolinguistic research that has shown that men tend to focus discourse on hierarchy and independence while women focus on intimacy and solidarity. This literature provides a solid grounding for conceptual extensions to the IT diffusion research and the Technology Acceptance Model.
Journal of the American Society for Information Science, 1991
Based on the results of the information and technology requirements assessments, three configurat... more Based on the results of the information and technology requirements assessments, three configurations for the model IIC were developeda basic model, an intermediate model, and an advanced model. These configurations of the model IIC represent increasing numbers and ...
Management Information Systems …, 2012
Aguirre-Urreta and Marakas (A&M) suggest in their simulation" Revisiting Bias Due to Constru... more Aguirre-Urreta and Marakas (A&M) suggest in their simulation" Revisiting Bias Due to Construct Misspecification: Different Results from Considering Coefficients in Standardized Form," that, like Jarvis et al.(2003), MacKenzie et al.(2005), and Petter et al.( ...
INTRODUCTIONOrganizations throughout the world experience difficultyand even failure in informati... more INTRODUCTIONOrganizations throughout the world experience difficultyand even failure in information technology transfer(ITT), defined as the movement of information technologyfrom creators to users (Cunningham & Srayrah, 1994). Thistransference of systems, whether they are developed internallyor purchased in the commercial software/ hardwaremarketplace, is plagued with problems (Kwon & Zmud,1987).The ITT problem is even more acute in developingcountries, such as the emerging...
Management Information Systems Quarterly, 1998
The likelihood that the firm's information systems are insufficiently protected against certain k... more The likelihood that the firm's information systems are insufficiently protected against certain kinds of damage or loss is known as "systems risk." Risk can be managed or reduced when managers are aware of the full range of controls available and implement the most effective controls. Unfortunately, they often lack this knowledge and their subsequent actions to cope with systems risk are less effective than they might otherwise be. This is one viable explanation for why losses from computer abuse and computer disasters today are uncomfortably large and still so potentially devastating after many years of attempting to deal with the problem. Results of comparative qualitative studies in two information services Fortune 500 firms identify an approach that can effectively deal with the problem. This theory-based security program includes: (1) use of a security risk planning model, (2) education/training in security awareness, and (3) Countermeasure Matrix analysis. abroad, the Local Government Audit Inspectorate (1981). Estimates of annual losses vary, but some set losses at between 500millionand500 million and 500millionand5 billion per year in the U.S. alone . If anything, losses have become even more serious as time goes on .
Communications of The Ais, 2005
This tutorial explains in detail what factorial validity is and how to run its various aspects in... more This tutorial explains in detail what factorial validity is and how to run its various aspects in PLS. The tutorial is written as a teaching aid for doctoral seminars that may cover PLS and for researchers interested in learning PLS. An annotated example with data is provided as an additional tool to assist the reader in reconstructing the detailed example.
Information Systems Research, 2002
Abstract Clear and precise metrics are essential for evaluating phenomena such as e-commerce (“Ne... more Abstract Clear and precise metrics are essential for evaluating phenomena such as e-commerce (“Net”-enablement) and the organizational use of networks and the Internet for commercial activities. Researchers require them for theory building and testing; practitioners require them for improving organizational processes. But for IS professionals to engage in the serious creation of metrics, it is critical to recognize:(1) that the phenomenon of net-enablement is an enduring change, probably led in the future by “brick-cum-click” firms,(2) ...
Communications of The ACM, 2000
Management Information Systems Quarterly, 2003
This article reports the findings of a longitudinal study of temporary virtual teams and explores... more This article reports the findings of a longitudinal study of temporary virtual teams and explores the role of behavior control on trust decline. We conducted an experiment involving 51 temporary virtual teams. Half of the teams were required to comply with behavior control mechanisms traditionally used in colocated teams. Their counterparts were allowed to self-direct. 1 Cynthia Beath was the accepting senior editor for this paper.
Management Information Systems Quarterly, 1999
This distinction is crucial in understanding and managing this process over time. The current stu... more This distinction is crucial in understanding and managing this process over time. The current study combines innovation diffusion and attitude theories in a theoretical framework to examine differences in pre-adoption and post-adoption beliefs and attitudes.
There is widespread agreement among researchers that system usage, defined as the utilization of ... more There is widespread agreement among researchers that system usage, defined as the utilization of information technology (IT) by individuals, groups, or organizations, is the primary variable through which IT affects white collar performance. Despite the number of studies targeted at explaining system usage, there are crucial differences in the way the variable has been conceptualized and operationalized. This wide variation
Information Systems Research, 2001
Abstract The conduct of net-enabled business, known variously as electronic commerce (EC) or e-Bu... more Abstract The conduct of net-enabled business, known variously as electronic commerce (EC) or e-Business, has changed the landscape and opportunities for IS research by shifting the focus from internal to customer/partnering systems. The article examines the two primary dyadic net-enabled relationships in the marketplace: B2C and B2B. It also considers issues that extend beyond these two relationships. B2C practice and research are analyzed from:(1) consumer,(2) service, and (3) risk perspectives. Three central issues of B2B or ...
ABSTRACT ion, and domain analysis. The sample includes users of urban and rural information cente... more ABSTRACT ion, and domain analysis. The sample includes users of urban and rural information centers, users of cybercafes, Internet Service Providers (ISP) and their subscribers. Questionnaires will be administered to private and public sector knowledge workers. Current national IT policy documents will be gathered and coded based on Gurbaxani's theoretical framework, and IT policy makers and parties affected by IT policy will be interviewed. Our study is unique in that it: (1) focuses on the complex socio-cultural construct, extending previous research in this line of inquiry; (2) combines qualitative and quantitative methodolgies; (3) links national economic development policies and their impact on ITT, and (4) is empirical, moving beyond frameworks and propositions to offer tangible insight into the dynamic relationship between culture values, policies, implementation factors and ITT. The study has implications for research and practice. From a research perspective, this study specifically r
Information Systems Research - ISR, 2002
Abstract Metrics are sine qua non for solid research, and scientific metrics have now been advanc... more Abstract Metrics are sine qua non for solid research, and scientific metrics have now been advanced with new approaches in the arena of Net-enablement (NE), otherwise known as e-commerce. Questions that likely require additional attention include:(1) Where/what is the real value in substituting information for physical processes?,(2) which NE systems effectively support end-to-end fulfillment?, and (3) when should a Net-enabled organization share information? With respect to extant studies in Net-enhancement, the field has been ...
Journal of The Ais - JAIS, 2000
The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption... more The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption. According to TAM, IT adoption is influenced by two perceptions: usefulness and ease-of-use. Research has shown that perceived usefulness (PU) affects intended adoption of IT, but has mostly failed to do so regarding perceived ease of use (PEOU). The basic proposition of this study is that this varying importance of PEOU may be related to the nature of the task. PEOU relates to assessments of the intrinsic characteristics of IT, such as the ease of use, ease of learning, flexibility, and clarity of its interface. PU, on the other hand, is a response to user assessment of its extrinsic, i.e., task-oriented, outcomes: how IT helps users achieve task-related objectives, such as task efficiency and effectiveness. Accordingly, the study theorizes that PEOU directly affects IT adoption only when the primary task for which the IT is deployed is directly associated with intrinsic IT characteris...
Academy of Management Perspectives, 1998
... Allergan Pharmaceuticals also uses temporary global teams throughout its orga-nization, impro... more ... Allergan Pharmaceuticals also uses temporary global teams throughout its orga-nization, improving time-to-market for new prod-ucts and creating effective marketing strategies for its customers around the world. ... Groupware Global teams are becoming more common. ...
Organizational Research Methods, 2014
This article addresses Rö nkkö and Evermann's criticisms of the partial least squares (PLS) appro... more This article addresses Rö nkkö and Evermann's criticisms of the partial least squares (PLS) approach to structural equation modeling. We contend that the alleged shortcomings of PLS are not due to problems with the technique, but instead to three problems with Rönkkö and Evermann's study: (a) the adherence to the common factor model, (b) a very limited simulation designs, and (c) overstretched generalizations of their findings. Whereas Rö nkkö and Evermann claim to be dispelling myths about PLS, they have in reality created new myths that we, in turn, debunk. By examining their claims, our article contributes to reestablishing a constructive discussion of the PLS method and its properties. We show that PLS does offer advantages for exploratory research and that it is a viable estimator for composite factor models. This can pose an interesting alternative if the common factor model does not hold. Therefore, we can conclude that PLS should continue to be used as an important statistical tool for management and organizational research, as well as other social science disciplines.
MIS Quarterly, 1997
University and a Master of Sciences from Tel-Aviv University. Before entering academia, he spent ... more University and a Master of Sciences from Tel-Aviv University. Before entering academia, he spent 12 years developing and managing large information systems, including the ongoing management of a state-of-the-art logistics system. His research specializations are: IS adoption, the Internet and Electronic Commerce, culture and gender effects, software maintenance, and trust. He won the second best conference place award for the 1996 Academy of Management Printed Papers Proceeding and has published in the IEEE Conference on Software Maintenance and ABSTRACT This study extends Davis' (1989) TAM model and Straub's (1994) SPIR addendum by adding gender to an IT diffusion model. The Technology Acceptance Model (TAM) has been widely studied in IS research as an explanation of the use of information systems across IS-types and nationalities. While this line of research has found significant cross-cultural differences, it has ignored the effects of gender, even though in socio-linguistic research, gender is a fundamental aspect of culture. Indeed, sociolinguistic research that has shown that men tend to focus discourse on hierarchy and independence while women focus on intimacy and solidarity. This literature provides a solid grounding for conceptual extensions to the IT diffusion research and the Technology Acceptance Model.
Journal of the American Society for Information Science, 1991
Based on the results of the information and technology requirements assessments, three configurat... more Based on the results of the information and technology requirements assessments, three configurations for the model IIC were developeda basic model, an intermediate model, and an advanced model. These configurations of the model IIC represent increasing numbers and ...