Wirtschaftswissenschaftliche Fakultät

Suche

Seminar: Information Systems Research


Dozent(in): Prof. Dr. Daniel Veit; Sabrina Hauff, M.Sc.; Dipl. Wirtsch.-Inf. Jan Huntgeburth; Philipp Klöcker, M.Sc.; Amelie Sach, M.Sc.; Dipl. Wirtsch.-Inf. Manuel Trenz
Termin: Anmeldung: 07.-20.10.2013;
Gebäude/Raum: J 1409 (Kick-Off: FW 2102)
Weitere Termine: Benachrichtigung: 23.10.2013
Kick-Off: 30.10.2013, 10.00 Uhr, Raum FW 2102
Zwischenpräsentation: Im Zeitraum 14.01.-16.01.2014 in Augsburg oder
17.01.-19.01.2014 im Rahmen eines Skiwochenendes in Sitten/Sion (Schweiz)
Abgabe: 17.03.2014, 12 Uhr
Ansprechpartner: Dipl. Wirtsch.-Inf. Jan Huntgeburth


Zusammenfassung:

At the end of this module, students have a basic understanding of empiricial research in information systems. Topics include IT innovation, IT adoption and continuance, digital strategy, business models, pricing, cloud computing, information privacy, electronic healthcare and others.

The goals of this seminar are:
  • Fundamental understanding of the principles of empirical academic work
  • Ability to systematically and independently adress a research topic
  • Knowledge of the methodological and theoretical foundations necessary to write a master thesis in the area of information systems


Inhalt der Lehrveranstaltung:

Part 1
  • Introduction to academic research principles and academic writing

Part 2

  • Examination of the topic and the research question
  • Investigation of the theoretical and methodological foundation
  • Structured analysis of the current state of research
  • Analysis and structuration of the results with regard to one specific topic in the field of information systems research

Part 3

  • Writing of the seminar thesis
  • Presentation and discussion of the results

 


Vorkenntnis für die Lehrveranstaltung:

Grundlegendes Wissen zu den Themenfeldern (bspw. durch Besuch der Vorlesungen des Lehrstuhls) ist hilfreich. 

Gute Englischkenntnisse sind notwendig, um die Literatur zu verstehen und die Präsentation sowie die Seminararbeit auszuarbeiten.

Der Besuch eines Einführungskurses der Universitätsbibliothek wird empfohlen.


Literatur zur Lehrveranstaltung:

Die Literatur wird im Rahmen des Seminars zugeteilt.

Bewerbung

Bitte beachten Sie, dass Sie sich bereits bei der Bewerbung zum Seminar (durch Auswahl im Bewerbungsvorgang) entscheiden, ob Sie Ihre Präsentation im Zeitraum 14.-16.01.2014 in Augsburg oder 17.-19.01.2014 in Sitten/Sion (Schweiz) halten werden.

Das Skiseminar findet in den Häusern der Kurt-Bösch-Stiftung statt. Pro Teilnehmer belaufen sich die Kosten auf 10,00 € Anmeldegebühr, zzgl. 7,50 € pro Nacht sowie Anreise, Verpflegung und Skipass. Die Anmeldegebühr ist bereits vorab bei Seminar-Kick-Off zu leisten.

Die Möglichkeit zur Bewerbung finden Sie im oben angegebenen Zeitraum hier.

 

Seminarthemen

Title

1) Comparing resistance theory and acceptance theory in IS research

Goal

With the introduction of information technology, organizations are faced with either the “acceptance” of or “user resistance” to such technology, namely IT innovations, management information systems, clinical information systems etc. Hence, managers, IT professionals as well as the academic research community have studied these phenomena in detail. The aim of this seminar paper is to give a comprehensive overview over the related literature on these two theories and single out the differing factors behind “acceptance” and “resistance” to information systems.

Readings on the Topic (T) and possible Methods (M)

T: Dwivedi et al. (2012): “Information System Theory, Explaining and Predicting Our Digital Society, Vol. 1; Springer Science + Business Media

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii.

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).


Title

2) Information Privacy in e-Health

Goal

More and more health information gets stored electronically, e.g. in an electronic health record at your health insurance company or at healthcare providers.  Many patients fear that their sensitive and confidential information is put at risk by this, especially since they are afraid that organizations do not take appropriate steps to protect their data. Goal of this seminar paper is to conduct a systematic literature review and analyze the role of information privacy in e-health literature.

Readings on the Topic (T) and possible Methods (M)

T: Angst, C.M.; Agarwal, R. (2009): Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion. MIS Quarterly (33:2), pp. 339-370.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

 



Title

3) Intention and Actual Behavior – The Same or Different?

Goal

Does the intention to do something always lead to the according behavior? Theories like the theory of reasoned action or the theory of planned behavior suggest this relationship and are often used in IS research. However, opposite evidence has also been found in some areas, e.g. information privacy or in innovation adoption.

The aim of this seminar thesis is to review academic literature considering the relationship between the constructs of intention and actual behavior and to investigate when and why they might be similar or different. A structured literature review method should be applied to fulfill this goal.

Readings on the Topic (T) and possible Methods (M)

T: Ajzen, I. (1991): The Theory of Planned Behvaior. Organizational Behavior and Human Decision Processes (50), pp. 179-211.

T: Fishbein, M.; Ajzen, I. (1975):Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.

T: Norberg, P.A.; Horne, D.R.; Horne, D.A. (2007): The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs (41:1), pp. 100-126.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.



Title

4) Stakeholder theory in IS research – a systematic literature review

Goal

The aim of this paper is to identify and structure the most important stakeholders/stakeholder groups involved in the introduction of IS systems. The student pursuing this paper should conduct a systematic literature overview with regards to stakeholder theory in IS and pinpoint what influence these stakeholders/stakeholder groups have on the adoption of IS systems.

Readings on the Topic (T) and possible Methods (M)

T: Dwivedi et al. (2012): “Information System Theory, Explaining and Predicting Our Digital Society, Vol. 1; Springer Science + Business Media

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii.

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).




Title

5) The impact of digital media on the public (dis)approval of organizations

Goal

Advances in information and communication technology have made it more difficult for companies to keep control over how they are perceived by various audiences. This trend combined with a general growing skepticism towards profit-driven firms represents a serious threat to organizations. The aim of this seminar paper is to review and structure existing literature as well as to identify research gaps.

Readings on the Topic (T) and possible Methods (M)

T: Bunting, M.; Lipski, R. (2000). Drowned out? Rethinking Corporate Reputation Management for the Internet. Journal of Communication Management, (5:2), pp.170-178.

T: Tucker, L.; Melewar, T. C. (2005). Corporate Reputation and Crisis Management: The Threat and Manageability of Anti-corporatism. Corporate Reputation Review (7:4), pp. 377-387.

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.



Title

6) The influence of social norms on IS adoption – a systematic literature review

Goal

The aim of this paper is to conduct a systematic literature review offering an overview on how social norms have influenced the introduction of information systems. The student pursuing this paper should identify the different forms of social norms. Finally, a short comparison to institutional theory should be part of this exercise.

Readings on the Topic (T) and possible Methods (M)

T: Venkatesh et al. (2003): User acceptance of information technology: Toward a unified view. MIS Quarterly, (27:3), p425-478

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly (26:2), p. xiii-xxiii.

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).



Title

7) The relationship between stakeholder activities, infomediaries, and organizational response to ethical issues

Goal

Whether and how organizations respond to ethical issues is the result of a socially constructed process. Taking into account not only stakeholder activities but also the role infomediaries, i.e., third-party organizations, further highlights the likewise social nature of information exchange. The aim of this seminar paper is to review and structure existing literature as well as to identify research gaps.

Readings on the Topic (T) and possible Methods (M)

T: Agle, B. R.; Mitchell, R. K.; Sonnenfeld, J. A. (1999). Who Matters to CEOs? An Investigation of Stakeholder Attributes and Salience, Corporate Performance, and CEO Values. Academy of Management Journal (42:5), pp. 507-525.

T: Deephouse, D.L.; Pursey, P.M.; Heugens, A.R. (2009). Linking Social Issues to Organizational Impact: The Role of Infomediaries and the Infomediary Process. Journal of Business Ethics (86:4), pp. 5 41-553.

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.



Title

8) The role of IS in managerial cognition

Goal

Managerial cognition refers to the way managers perceive, interpret, and reason about environmental, conceptual environmental or organizational stimuli. It is seen as a crucial mediator between changes in the external environment and corresponding organizational responses. Information systems assisting in gathering information from outside the organization can significantly shape the process of managerial cognition. The aim of this seminar paper is to review and structure existing literature as well as to identify research gaps.

Readings on the Topic (T) and possible Methods (M)

T: Kiesler, S.; Sproull, L. (1982). Managerial Response to Changing Environments: Perspectives on Problem Sensing from Social Cognition. Administrative Science Quarterly (27:4), pp. 548-570.

T: Ahituv, N.; Zif, J.; Machlin, I. (1998). Environmental Scanning and Information Systems in Relation to Success in Introducing New Products. Information & Management (33:4), pp. 201-2011.

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

 

 

Title

9) The Role of Social Influences on Adoption Behavior

Goal

Whether a newly developed technology becomes a success or a failure is an important issue for organizations. Within the last years, adoption theories have focused not only on people's beliefs, technology usability or its usefulness to explain adoption decisions but also incorporated the social enviornment to account for the social influence of third parties. Even more, the emergence of social media has put new emphasis on social influences since it enables new ways of communication and collaboration. Thus, aim of this study is to summon and compare adoption literature in an IS context that includes a construct of social influence like peer pressure, social norms, or the perceived behavior of others, to explain adoption and usage behavior of information technology.

Readings on the Topic (T) and possible Methods (M)

T: Dickinger, A.; Arami, M.; Meyer, D. (2009): The Role of Perceived Enjoyment and Social Norm in the Adoption of Technology with Network Externalities. European Journal of Information Systems (17:1), pp. 4-11.

T: Eckhardt. A.; Laumer, S.; Weitzel, T. (2009): Who Influences Whom? Analyzing Workplace Referents' Social Influence on IT Adoption and Non-Adoption. Journal of Information Technology (24:1), pp. 11-24.

M: Okoli, C.; Schabram, K. (2010): A Guide to Conducting a Systematic Literature Review of Information Systems Research. (10:26).

M: Webster, J.; Watson, R. T. (2002): Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly (26:2), pp. xiii-xxiii.

 


weitere Informationen zu der Lehrveranstaltung:

empfohlenes Studiensemester der Lehrveranstaltung: für alle Semester
Fachrichtung Lehrveranstaltung: Master
Dauer der Lehrveranstaltung: 4 SWS
Typ der Lehrveranstaltung: S - Seminar
Leistungspunkte: 6 ECTS
Bereich: iBWL: O&I
Prüfung: Referat / Hausarbeit
Turnus des Prüfungsangebots: jedes SS/WS
Dauer der Prüfung: 30 Minuten
Semester: alle WS und SS