Wirtschaftswissenschaftliche Fakultät

Suche

Seminar: Information Systems Research


Dozent(in): Prof. Dr. Daniel Veit; An Bui, M.Sc.; Sabrina Hauff, M.Sc.; Dipl. Wirtsch.-Inf. Jan Huntgeburth; Dipl. Wirtsch.-Inf. Manuel Trenz
Termin: Bewerbung: 31.03.-13.04.2014
Gebäude/Raum: FW 1207
Weitere Termine: Kick-off: 23.04.2014, 15:30-17:30 Uhr
Präsentation: 18.06.2014, ab 9 Uhr
Abgabe: 15.08.2014
Ansprechpartner: Sabrina Hauff, M.Sc.

Zusammenfassung:

At the end of this module, students have a basic understanding of empiricial research in information systems. Topics include IT innovation, IT adoption and continuance, digital strategy, business models, pricing, cloud computing, information privacy, electronic healthcare and others.

The goals of this seminar are:
  • Fundamental understanding of the principles of empirical academic work
  • Ability to systematically and independently adress a research topic
  • Knowledge of the methodological and theoretical foundations necessary to write a master thesis in the area of information systems


Inhalt der Lehrveranstaltung:

Part 1
  • Introduction to academic research principles and academic writing

Part 2

  • Examination of the topic and the research question
  • Investigation of the theoretical and methodological foundation
  • Structured analysis of the current state of research
  • Analysis and structuration of the results with regard to one specific topic in the field of information systems research

Part 3

  • Writing of the seminar thesis
  • Presentation and discussion of the results

Literatur zur Lehrveranstaltung:

Die Literatur wird im Rahmen des Seminars zugeteilt.


Vorkenntnisse für die Lehrveranstaltung:

Grundlegendes Wissen zu den Themenfeldern (bspw. durch Besuch der Vorlesungen des Lehrstuhls) ist hilfreich. 

Gute Englischkenntnisse sind notwendig, um die Literatur zu verstehen und die Präsentation sowie die Seminararbeit auszuarbeiten.

Der Besuch eines Einführungskurses der Universitätsbibliothek wird empfohlen.


Bewerbungszeitraum:

Die Plätze in den Seminaren sind limitiert. Bitte nutzen Sie während der Anmeldephase Digicampus.

 

Seminarthemen

Title

1) Multichannel Commerce  – A Structured Literature Review on Consumer’s Choice between Traditional and Electronic Channels

Goal

The complexity of customer’s decision making is increased by the larger variety of channels that can be used for purchase. Customers do not only have to choose the appropriate product and the appropriate vendor quality-price ratio, but also have to select whether to purchase in store or online. Channel choice, depending on many different customer-specific, product-specific, vendor-specific or situational factors, has therefore important strategic implications for businesses.

The aim of this master seminar thesis is to conduct a structured literature review on channel choice and structure the results of previous studies in a comprehensive way in order to provide researchers with an understanding of the current scientific knowledge on this topic and potential avenues for future research.

Readings on the Topic (T) and possible Methods (M)

T: Choudhury, V., and Karahanna, E. 2008. “The Relative Advantage of Electronic Channels: A Multidimensional View,” MIS Quarterly (32:1), pp. 179–200.

T:  Gensler, S., Verhoef, P. C., and Böhm, M. 2012. “Understanding consumers’ multichannel choices across the different stages of the buying process,” Marketing Letters (23:4), pp. 987–1003.

T:  Granados, N., Gupta, A., and Kauffman, R. J. 2012. “Online and offline demand and price elasticities: Evidence from the air travel industry,” Information Systems Research (23:1), pp. 164–181.

T: Valentini, S., Neslin, S. A., and Montaguti, E. 2011. “Decision Process Evolution in Customer Channel Choice,” Journal of Marketing (75), pp. 72–86.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review,” MIS Quarterly (26:2), pp. 13-23.

Title

2) The Role of Social Influences on Adoption Behavior

Goal

Whether a newly developed technology becomes a success or a failure is an important issue for organizations. Within the last years, adoption theories have focused not only on people's beliefs, technology usability or its usefulness to explain adoption decisions but also incorporated the social enviornment to account for the social influence of third parties. Even more, the emergence of social media has put new emphasis on social influences since it enables new ways of communication and collaboration. Thus, aim of this study is to summon and compare adoption literature in an IS context that includes a construct of social influence like peer pressure, social norms, or the perceived behavior of others, to explain adoption and usage behavior of information technology.

Readings on the Topic (T) and possible Methods (M)


T:Dickinger, A.; Arami, M.; Meyer, D. (2009): The Role of Perceived Enjoyment and Social Norm in the Adoption of Technology with Network Externalities. European Journal of Information Systems (17:1), pp. 4-11.

T: Eckhardt. A.; Laumer, S.; Weitzel, T. (2009): Who Influences Whom? Analyzing Workplace Referents' Social Influence on IT Adoption and Non-Adoption. Journal of Information Technology (24:1), pp. 11-24.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

Title

3) Information Boundary Theory in IS Research

Goal

Information boundary theory (also called communication boundary management theory) presents a process through which a person manages communications in balancing a need for information disclosure with the need for information privacy. It shows how individuals develop rules of whether an attempt by an external entitiy to get access to information is seen as intrusion depending on situational and personal conditions. Goal of this seminar paper is to conduct a systematic literature review and analyze how information boundary theory was adapted and applied to Information System Literature. Moreover, possible future applications of information boundary theory in Information Systems Research should be discussed.

Readings on the Topic (T) and possible Methods (M)

T: Xu, H; Dinev, T.; Smith, H.J.; Hart, P. (2008): Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View. ICIS 2008.

T: Petronio, S. (1991): Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples. Communication Theory, pp. 311-335.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

Title

4) Intention and Actual Behavior – The Same or Different?

Goal

Does the intention to do something always lead to the according behavior? Theories like the theory of reasoned action or the theory of planned behavior suggest this relationship and are often used in IS research. However, opposite evidence has also been found in some areas, e.g. information privacy or in innovation adoption.

The aim of this seminar thesis is to review academic literature considering the relationship between the constructs of intention and actual behavior and to investigate when and why they might be similar or different. A structured literature review method should be applied to fulfill this goal.

Readings on the Topic (T) and possible Methods (M)

T: Ajzen, I. (1991): The Theory of Planned Behvaior. Organizational Behavior and Human Decision Processes (50), pp. 179-211.

T: Fishbein, M.; Ajzen, I. (1975):Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.

T: Norberg, P.A.; Horne, D.R.; Horne, D.A. (2007): The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs (41:1), pp. 100-126.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

Title

5) Reviewing the Role of “Motivation” in IS Adoption Research

Goal

When it comes to the adoption of information systems, motivation has been identified as a crucial factor determining individuals’ behavior and intentions.

The aim of this seminar paper is to give a comprehensive overview over the related literature on how the concept of “motivation” is used in IS adoption research. Ideally, the seminar paper should result in an overview on what types of motivations exist and give recommendations on which type to deploy in certain cases.

Readings on the Topic (T) and possible Methods (M)

T: Gerow, J.E., Ayyagari, R., Thatcher, J.B., and Roth, P.L. 2012. "Can We Have Fun @ Work? The Role of Intrinsic Motivation for Utilitarian Systems," European Journal of Information Systems (22), pp. 360-380.


T: Malhotra, Y., Galletta, D.F., and Kirsch, L.J. 2008. "How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations," Journal of Management Information Systems (25:1), Summer2008, pp. 267-299

T: Venkatesh, V. 1999. "Creation of Favorable User Perceptions: Exploring the Role of Intrinsic Motivation," MIS Quarterly (23:2), pp. 239-260.

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii. Available at: [Accessed July 16, 2010].

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).

Title

6) The Relationship between Trust and Information Privacy

Goal

When conducting online activities, e.g. transacting online business or using social networking sites, many users are concerned about their information privacy and thus are less willing to share their information. Creating a trusted online environment can mitigate these concerns.

The aim of this seminar thesis is to review academic literature considering the relationship between trust and information privacy concerns. A structured literature review method should be applied to fulfill this goal.

Readings on the Topic (T) and possible Methods (M)

T: Dwyer, C.; Hiltz, S. R.; Passerini, K. (2007): Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace. Proceedings of AMCIS 2007


T: Bansal, G.; Zahedi, F.; Gefen, D. (2008): The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation. ICIS 2008


M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).


M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

Title

7) The Contributions of IS Research for Understanding and Mitigating the Digital Divide

Goal

IS Researchers have recognized that inequality regarding access to ICT limits people’s ability to participate in the information society where the creation, the distribution, and the use of information is a significant economic, political, and cultural activity. Based on a given digital divide framework, this seminar thesis aims to examine the contributions of IS research for understanding and mitigating the digital divide phenomenon.

Readings on the Topic (T) and possible Methods (M)

T: van Dijk JAGM (2006) Digital Divide Research, Achievements and Shortcomings. Poetics 34:221–235.

T: Veit, D.; Huntgeburth, J. (2013) Foundations of Digital Government, Springer.

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii. Available at: [Accessed July 16, 2010].

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).

Title

8) Go green!  – A structured Literature Review on Green Information Systems

Goal

Society is currently facing a tremendous challenge: While energy consumption is rising worldwide, it is unavoidable that energy resources will be depleted in the foreseeable future. Information Systems Research is addressing this problem through its subfield “Green IS” (also called: energy informatics). Green IS tries to foster environmental sustainability by driving ideas of eco-efficiency, eco-effectiveness and eco-equity.

The aim of this seminar paper is (a) to compile an overview of the latest scientific literature in order to determine what has already been accomplished in IS research regarding this subfield and (b) to find real-world examples which reflect the findings of the research (where possible/available).

Readings on the Topic (T) and possible Methods (M)

T: Watson, R. T., Boudreau, M.-C., & Chen, A. J. (2010). Information Systems and Environmentally Sustainable Development: Energy Informatics and New Directions for the IS Community. MIS Quarterly, 34(1), 23–38.

T: Watson, R. T., Lind, M., & Haraldson, S. (2012). The Emergence of Sustainability as the New Dominant Logic: Implications for Information Systems. In ICIS 2012 Proceedings.

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii. Available at: [Accessed July 16, 2010].

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).

 

 


weitere Informationen zu der Lehrveranstaltung:

empfohlenes Studiensemester der Lehrveranstaltung: ab dem 2. Semester
Fachrichtung Lehrveranstaltung: BWL
Dauer der Lehrveranstaltung: 4 SWS
Typ der Lehrveranstaltung: S - Seminar
Leistungspunkte: 6 ECTS
Bereich: Master iBWL/iVWL: Major/Minor Strategy & Information; ReWi: SB III Unternehmen und Management
Prüfung: Referat / Hausarbeit
Turnus des Prüfungsangebots: jedes SS/WS
Semester: alle WS und SS