ICIS 2010 ISBN: 978-0-615-41898-8

Welcome from the 2010 ICIS Program Chairs

This year celebrates the 31st International Conference on Information Systems. The conference theme–“Gateway to the Future”–focuses on how information technology both shapes and is shaped by the world in which we live, work, and play. This theme is tied to the conference location. St. Louis is known by its nickname, "Gateway to the West", because it served as a hub for millions of people expanding westward across America in search of better futures for themselves and their families.

For more information about the program and paper acceptance rates, please click here

Mary Lacity, University of Missouri-St. Louis
Mary Lacity
University of Missouri-St. Louis
Sal March,Vanderbilt University
Sal March
Vanderbilt University
Fred Niederman,St. Louis University
Fred Niederman
St. Louis University

Submissions from 2010

PDF

RATING SCALES FOR COLLECTIVE INTELLIGENCE IN INNOVATION COMMUNITIES:WHY QUICK AND EASY DECISION MAKING DOES NOT GET IT RIGHT, Christoph Riedl, Ivo Blohm, Jan Marco Leimeister, and Helmut Krcmar

PDF

CONTEXTUALIZING IS IN BUSINESS: $ R US FINANCIAL PLANNING – A MODULAR TEACHING CASE FOR INTRODUCTORY 1ST YEAR GENERAL BUSINESS MIS COURSES, Kai Riemer and Deborah Bunker

PDF

IT’S NOT A PROPERTY! EXPLORING THE SOCIOMATERIALITY OF SOFTWARE USABILITY, Kai Riemer and Nadine Vehring

PDF

VIRTUAL TEACHING CASES?AN EXPLORATORY STUDY, Russell W. Robbins and Brian S. Butler

PDF

CONSTRUCT VALIDITY IN PARTIAL LEAST SQUARES PATH MODELING, Mikko Rönkkö and Jukka Ylitalo

PDF

SUPPORTING FINANCIAL DATA WAREHOUSE DEVELOPMENT: A COMMUNICATION THEORY-BASED APPROACH, Christoph Rosenkranz, Marc Räkers, Wolf Behrmann, and Roland Holten

PDF

CHALLENGING THE ECONOMIC BIAS AMONG SKILL FORMATION RESEARCH IN THE IT INDUSTRY, Bruce Rowlands

PDF

CHATTER MATTERS: HOW TWITTER CAN OPEN THE BLACK BOX OF ONLINE WORD-OF-MOUTH, Huaxia Rui, Yizao Liu, and Andrew B. Whinston

PDF

THE ROLE OF WORKAROUNDS DURING AN OPENSOURCE ELECTRONIC MEDICAL RECORD SYSTEM IMPLEMENTATION, Hani Safadi and Samer Faraj

PDF

VALUING IT-RELATED INTANGIBLE CAPITAL, Adam Saunders

PDF

THE IMPACT OF INSTITUTIONAL INFLUENCES ON PERCEIVED TECHNOLOGICAL CHARACTERISTICS AND REAL OPTIONS IN CLOUD COMPUTING ADOPTION, S. Saya, L. G. Pee, and A. Kankanhalli

PDF

FROM TELESALES TO TELE-ADVISORY SERVICES IN TRAVEL AGENCIES, Susanne Schmidt-Rauch, Raphael Schaer, and Gerhard Schwabe

PDF

Exploring Technology and Task Adaptation Among Individual Users of Mobile Technology, Kurt Schmitz, Kimberly Webb, and James Teng

PDF

REAL DECISIONS IN VIRTUAL WORLDS: TEAM COLLABORATION AND DECISION MAKING IN 3D VIRTUAL WORLDS, Alexander P. Schouten, Bart van den Hooff, and Frans Feldberg

PDF

TRANSFORMING ECOSYSTEM RELATIONSHIPS IN DIGITAL INNOVATION, Lisen Selander, Ola Henfridsson, and Fredrik Svahn

PDF

A WAY TO BECOME ENTERPRISE 2.0: BEYOND WEB 2.0 TOOLS, DongBack Seo and Annette Rietsema

PDF

Social Influence and Willingness to Pay for Online Video Games, Andrew J. Setterstrom and J. Michael Pearson

PDF

The Impact of Person-Organization Fit on Turnover in Open Source Software Projects, Pratyush Nidhi Sharma, Sherae L. Daniel, and Ting-Ting (Rachel) Chung

PDF

DIGITAL DOWNLOADS AND THE EXTINCTION OF RESALE MARKETS FOR INFORMATION GOODS, Benjamin Shiller

PDF

IBM POWER SYSTEMS AND SERVICE ORIENTED ARCHITECTURE AT BANK OF AMERICA’S FOREIGN ITEMS SYSTEMS OFFICE, Keng Siau and David DeWester

PDF

UNDERSTANDING INDIVIDUAL ADOPTION AND USE OF SOCIAL COMPUTING: A USER-SYSTEM FIT MODEL AND EMPIRICAL STUDY, Moataz Aly Soliman and Anne Beaudry

PDF

Mechanisms Underlying Social Loafing in Technology Teams: An Empirical Analysis, Sankara-Subramanian Srinivasan, Likoebe M. Maruping, and Lionel P. Robert

PDF

Exploring Dimensions of Mobile Information Technology Dependence, Thomas F. Stafford, Michelle Belton, Terry Nelson, and Aaron Peevyhouse

PDF

Exploring Co-presence Enabled Collaboration in Social Computing Inspired Enterprise Systems, Niran Subramaniam, Joe Nandhakumar, and Joao Baptista

PDF

Toward a Model of Mindfulness in Technology Acceptance, Heshan Sun and Yulin Fang

PDF

HOW IT SERVICE SUPPLIERS ACQUIRE CAPABILITIES IN OUTSOURCING ALLIANCES: AN EVOLUTIONARY PERSPECTIVE, Ning Su, Natalia Levina, and Hao Lou

PDF

Understanding Sustained Participation in Transactional Virtual Communities, Yongqiang Sun, Yulin Fang, and Kai H. Lim

PDF

HeWEK: Measuring the Health Website Quality From the Perception of the African American, Samar I. Swaid

PDF

JOB HOPPING, KNOWLEDGE SPILLOVERS, AND REGIONAL RETURNS TO INFORMATION TECHNOLOGY INVESTMENTS, Prasanna Tambe and Lorin M. Hitt

PDF

Now I.T.’s “Personal”: Offshoring and the Shifting Skill Composition of the US Information Technology Workforce, Prasanna Tambe and Lorin M. Hitt

PDF

DEVELOPING A CUSTOMER-CENTRIC, INCLUSIVE EGOVERNMENT: LESSONS FROM THE CENTRAL PROVIDENT FUND BOARD OF SINGAPORE, Barney Tan, Shan L. Pan, and Virginia Cha

PDF

EVOLUTIONARY SENSEMAKING IN ENTERPRISE APPLICATIONS IMPLEMENTATION: INSIGHTS FROM A STATE-OWNED ENTERPRISE IN CHINA, Barney Tan, Shan L. Pan, Wenbo Chen, and Lihua Huang

PDF

Enabling Agility through Routinized Improvisation in IT Deployment: The Case of Chang Chun Petrochemicals, Barney Tan, Shan L Pan, Tzu-Chuan Chou, and Ju-Yu Huang

PDF

EVALUATING THE DOWNSTREAM EFFECTS OF THE TWOSTEP TRANSFORMATION TOWARD NORMALITY: IMPLICATIONS FOR MIS RESEARCH, Gary F. Templeton and Marcia Weidenmier Watson

PDF

SOCIALLY EXCHANGING PRIVACY FOR PLEASURE: HEDONIC USE OF COMPUTER-MEDIATED SOCIAL NETWORKS, Ravi Thambusamy, Mitchell Church, Hamid Nemati, and Jesse Barrick

PDF

CORPORATE ECOLOGICAL RESPONSIVENESS, ENVIRONMENTAL AMBIDEXTERITY AND IT-ENABLED ENVIRONMENTAL SUSTAINABILITY STRATEGY, Ravi Thambusamy and A. F. Salam

PDF

Performing Under Pressure: IT Execution in a $1.4bn Business Transformation, Alan Thorogood, Peter Reynolds, and Philip Yetton

PDF

Selection of Web Services Based on Opinion Mining of Free-Text User Reviews, Nicholas A. Thurow and John D. Delano

PDF

Object and Symbol in Technology Adoption, Anthony M. Townsend, Janea L. Triplett, Brian E. Mennecke, and Andrew W. Luse

PDF

UNDERSTANDING THE EFFECT OF DETERRENCE MECHANISMS ON CYBERLOAFING: EXPLORING A GENERAL DETERRENCE MODEL WITH A SOCIAL PERSPECTIVE, Joseph C. Ugrin and J. Michael Pearson

PDF

SOFTWARE BUSINESS IN INDUSTRIAL COMPANIES: IDENTIFYING CAPABILITIES FOR THREE TYPES OF SOFTWARE BUSINESS, Karin Väyrynen

PDF

BROKERING SITUATIONS IN DATA WAREHOUSE DEVELOPMENT PROJECTS: AN EXPLORATORY STUDY, Helena Vranesic and Christoph Rosenkranz

PDF

Investigating the Cultural Dimension of IT-Usage: IT-Acculturation, an Essential Construct in IS Research, Isabelle Walsh

PDF

Herding in Multi-winner Auctions, Hui Wang and Martina Greiner

PDF

IT Employees’ Organizational Identification: Examining its Antecedents and Impact on Turnover, Xinwei Wang, Xue Yang, Hock-Hai TEO, and Yu Tong

PDF

IS IT THE GREAT EQUALIZER? A SOCIAL CLASS BASED LONGITUDINAL ANALYSIS OF TECHNOLOGY DIFFUSION, Sunil Wattal, Yili Hong, and Munir Mandviwalla

PDF

IS BILL GATES THE EXCEPTION OR THE NORM – ROLE OF HUMAN CAPITAL IN OCCUPATION CHOICE IN IT INDUSTRIES, Sunil Wattal and Jose M. Plehn-Dujowich

PDF

THE IMPACT OF NATIONAL CULTURE ON KNOWLEDGE SHARING IN GLOBAL VIRTUAL COLLABORATION: A PRACTICE LENS, Kangning Wei and Kevin Crowston

PDF

PRO-COMPETITION PUBLIC POLICY IN NETWORK MARKETS WITH SWITCHING COSTS: EVIDENCE FROM “MOBILE NUMBER PORTABILITY” IN WIRELESS TELECOMMUNICATIONS INDUSTRY, Xiahua Wei and Kevin Zhu

PDF

THE IMPACT OF INTELLECTUAL PROPERTY ENFORCEMENT ON OPEN SOURCE SOFTWARE ADOPTION, Wen Wen, Chris Forman, and Stuart Graham

PDF

PRIVACY AND INFORMED CONSENT IN ONLINE INTERACTIONS: EVIDENCE FROM EXPERT FOCUS GROUPS, Edgar A. Whitley and Nadja Kanellopoulou

PDF

Want Pudding? An Analytic Model of the Benefits and Constraints of Process Standardization in Services, Matt Wimble, Brian Pentland, Derek Hillison, and John Tripp

PDF

COORDINATING DISTRIBUTED SOFTWARE DEVELOPMENT: A RESOURCE RELATIONSHIPS PERSPECTIVE ON ANALYZING THE SPATIAL EFFECTS, Gamel O. Wiredu

PDF

An Integrated Perspective on IT Project Alignment in Highly Dynamic Environments – A Multi-Level Analysis, Martin Wolf, Roman Beck, and Jens Vykoukal

PDF

HOW MICROBLOG FOLLOWER NETWORKS AFFECT OPEN SOURCE SOFTWARE PROJECT SUCCESS, Xuan Yang, Daning Hu, and Robert M. Davison

PDF

SUSTAINABILITYAND GROWTH OFONLINE KNOWLEDGE COMMUNITIES: EXAMINING THE IMPORTANCE OFPERCEIVED COMMUNITYSUPPORTAND PERCEIVED LEADER SUPPORT, Hua Ye, Yuanyue Feng, and Chun Fung (Ben) Choi

PDF

Towards Organized Search and Unexpected Discoveries: The Impacts of Product Tags and Featured Users on Online Product Search, Cheng Yi, Zhenhui Jiang, and Izak Benbasat

PDF

ARE BAD REVIEWS ALWAYS STRONGER THAN GOOD? ASYMMETRIC NEGATIVITY BIAS IN THE FORMATION OF ONLINE CONSUMER TRUST, Dezhi Yin, Samuel Bond, and Han Zhang

PDF

REVISITING THE EFFECT OF SOCIAL CAPITAL ON KNOWLEDGE SHARING IN WORK TEAMS: A MULTILEVEL APPROACH, Angela Yan Yu, Jin-Xing Hao, Xiao-Ying Dong, and Mohamed Khalifa

PDF

EMBEDDED SOCIAL LEARNING IN ONLINE SOCIAL NETWORKING, Angela Yan Yu, Stella Wan Tian, Douglas Vogel, and Ron Chi-Wai Kwok

PDF

Helping or Hampering: Effects of IT Service Outsourcing on Client’s Product Innovation, Feng Yuanyue and Cheng Suang Heng

PDF

Designing mixed-method research inspired by a critical realism philosophy: A tale from the field of IS innovation, Markos Zachariadis, Susan Scott, and Michael Barrett

PDF

CONCEPTUALIZING SOCIAL INFLUENCE IN THE UBIQUITOUS COMPUTING ERA: TECHNOLOGY ADOPTION AND USE IN MULTIPLE USE CONTEXTS, Jay Zeal, Stephen P. Smith, and Rens Scheepers

PDF

UNDERSTANDING THE INFORMATIONAL SOCIAL INFLUENCE OF ONLINE REVIEW PLATFORMS, Kem Z.K. Zhang, Matthew K.O. Lee, and Sesia J. Zhao

PDF

ROLE IDENTITY SALIENCE AND USER PARTICIPATION IN ONLINE COMMUNITIES, Xiaoquan (Michael) Zhang, Chong (Alex) Wang, and Kar Yan Tam

PDF

Information Sharing When Firms Compete for Common-Value Customers, Xia Zhao and Ling Xue

PDF

Online User Reviews and Professional Reviews: A Bayesian Approach to Model Mediation and Moderation Effects, Wenqi Zhou and Wenjing Duan

PDF

A HOLISTIC APPROACH FOR SECURITY REQUIREMENT SPECIFICATION FOR LOW-COST, DISTRIBUTED UBIQUITOUS SYSTEMS, Yanjun Zuo