Wirtschaftswissenschaftliche Fakultät

Suche

Seminar: Advanced Management Information Systems


Dozent(in): Prof. Dr. Daniel Veit; An Bui, M.Sc.; Sabrina Hauff, M.Sc.; Amelie Sach, M.Sc.; Dipl. Wirtsch.-Inf. Manuel Trenz
Termin: Anmeldung: 29.09.-12.10.2014
Gebäude/Raum: Kick-off: FW2102; Zwischenpräsentation: FW2102
Weitere Termine: Benachrichtigung: 14.10.2014
Kick-Off: 28.10.2014, 14:00-15:30 Uhr
Zwischenpräsentation: 22.01.2015, 14:00-17:30 Uhr
Abgabe: 13.03.2015
Ansprechpartner: Sabrina Hauff, M.Sc.


Zusammenfassung:

At the end of this module, students have extended their knowledge on management information systems and empiricial research in the information systems field. The seminar focusses on strategic questions with regards to management information systems such as innovation, adoption and continuance.

The goals of this seminar are:
  • Advanced insights on issues related to management information systems
  • Fundamental understanding of the principles of empirical academic work
  • Ability to systematically and independently adress a research topic
  • Knowledge of the methodological and theoretical foundations necessary to write a master thesis in the area of information systems


Inhalt der Lehrveranstaltung:

Part 1

- Introduction to academic research principles and academic writing

Part 2

- Examination of the topic and the research question
- Investigation of the theoretical and methodological foundation
- Structured analysis of the current state of research
- Analysis and structuration of the results

with regard to one specific topic in the field of management information systems research

Part 3

- Writing of the seminar thesis
- Presentation and discussion of the results


Vorkenntnis für die Lehrveranstaltung:

Grundlegendes Wissen zu den Themenfeldern (bspw. durch Besuch der Vorlesungen des Lehrstuhls) ist hilfreich. 

Gute Englischkenntnisse sind notwendig, um die Literatur zu verstehen und die Präsentation sowie die Seminararbeit auszuarbeiten.

Der Besuch eines Einführungskurses der Universitätsbibliothek wird empfohlen.


Literatur zur Lehrveranstaltung:

Die Literatur wird im Rahmen des Seminars zugeteilt.

Bewerbung


Die Bewerbung erfolgt im oben angegebenen Zeitraum via Digicampus.

 

Seminar Topics

Title

1) Reviewing the Role of “Motivation” in IS Adoption Research

Goal

When it comes to the adoption of information systems, motivation has been identified as a crucial factor determining individuals’ behavior and intentions.

The aim of this seminar paper is to give a comprehensive overview over the related literature on how the concept of “motivation” is used in IS adoption research. Ideally, the seminar paper should result in an overview on what types of motivations exist and give recommendations on which type to deploy in certain cases.

Readings on the Topic (T) and possible Methods (M)

T: Gerow, J.E., Ayyagari, R., Thatcher, J.B., and Roth, P.L. 2012. "Can We Have Fun @ Work? The Role of Intrinsic Motivation for Utilitarian Systems," European Journal of Information Systems (22), pp. 360-380.
T: Malhotra, Y., Galletta, D.F., and Kirsch, L.J. 2008. "How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations," Journal of Management Information Systems (25:1), Summer2008, pp. 267-299
T: Venkatesh, V. 1999. "Creation of Favorable User Perceptions: Exploring the Role of Intrinsic Motivation," MIS Quarterly (23:2), pp. 239-260.
M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii.
M: Okoli, C., and Schabram, K. 2010. “A Gide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).

Supervisor

An Bui, M.Sc.

Title

2) Gaming for a Higher Purpose – A structured Literature Review on the Applications and Effects of Gamification

Goal

Gamification is the “use of game design elements in non-game contexts” (Detering et al. 2011, p. 10) and has emerged as a new phenomenon in recent years. Its goal is to drive the engagement and interest of users and customers by adding gamefulness to contexts with a “higher purpose” such as education, health & fitness or energy consumption.

While Gamification has already been adopted and practiced by a vast number of companies for their products and services, it still remains a fairly new topic for the IS discipline. Thus, the aim of this seminar paper is to give a comprehensive and state-of-the-art overview over the academic discourse on Gamification within scientific (IS / Management / Psychology) literature.

Readings on the Topic (T) and possible Methods (M)

T: Deterding, S., Dixon, D., Khaled, R., and Nacke, L. 2011. “From game design elements to gamefulness: defining gamification,” in Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, ACM, pp. 9–15.
T:
Kankanhalli, A., Taher, M., Cavusoglu, H., and Kim, S. H. 2012. “Gamification: A New Paradigm for Online User Engagement,” in Proceedings International Conference on Informations Systems, Orlando, Florida, pp. 1–10.
M:
Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii.
M:
Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).

Supervisor

An Bui, M.Sc.

Title

3) Can Information Systems be fun?  A Structured Literature Review on Hedonic Features of Information Systems

Goal

Information Systems with hedonic (i.e. enjoyment-oriented) characteristics are said to be more probably adopted than traditional information systems as they focus on the fun-aspect rather than the productivity-aspect of using information systems. Furthermore, hedonic information systems seem to encourage prolonged (i.e., continuous) use as they are considered to be part of home or leisure activities.

The goal of this seminar paper is to compile an overview on what hedonic characteristics an information system can have and which characteristics may particularly support the adoption of certain information system types (e.g. Green IS).

Readings on the Topic (T) and possible Methods (M)


T: Van der Heijden, H. 2004. “User acceptance of hedonic information systems,” MIS quarterly, pp. 695–704.
T: Gerow, J. E., Ayyagari, R., Thatcher, J. B., and Roth, P. L. 2013. “Can we have fun @ work? The role of intrinsic motivation for utilitarian systems,” European Journal of Information Systems (22:3), pp. 360–380.
M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii.
M: Okoli, C., and Schabram, K. 2010. “A Gide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).

Supervisor

An Bui, M.Sc.

Title

4) Why are we adopting Green Information Systems? A structured Literature Review on Motivations to adopt Green IS

Goal

Society is currently facing a tremendous challenge: While energy consumption is rising worldwide, it is unavoidable that energy resources will be depleted in the foreseeable future. Information Systems Research is addressing this problem through its subfield “Green IS” (also called: energy informatics). In recent years a variety of Green IS has emerged for various use cases and out of distinct motivations. The aim of this seminar paper is to compile an overview of reasons and motivations identified through academic literature.

Readings on the Topic (T) and possible Methods (M)

T: Watson, R. T., Boudreau, M.-C., & Chen, A. J. (2010). Information Systems and Environmentally Sustainable Development: Energy Informatics and New Directions for the IS Community. MIS Quarterly, 34(1), 23–38.

T: Watson, R. T., Lind, M., & Haraldson, S. (2012). The Emergence of Sustainability as the New Dominant Logic: Implications for Information Systems. In ICIS 2012 Proceedings.

M: Webster, J.; Watson, R. T. (2002): Analyzing the past to prepare for the future: Writing a literature review. MIS QUARTERLY (26:2), p. xiii-xxiii. Available at: [Accessed July 16, 2010].

M: Okoli, C., and Schabram, K. 2010. “A Guide to Conducting a Systematic Literature Review of Information Systems Research,” Sprouts: Working Papers on Information Systems (10:26).

Supervisor

An Bui, M.Sc.


Title

5) Protection motivation theory – a literature review

Goal

Protection motivation theory provides a framework to study individual's fear appeal and behavioral change. It suggests that an individual's intention to protect him/herself from potential threats depends on the perceived severity and the probability of a threat as well as the efficacy of the preventive behavior and the individual's perceived ability to undertake this behavior. This theory has been applied in privacy research to understand how individual factors influence privacy concerns.

This master seminar thesis has two goals. First, the development of protection motivation theory as well as the theory itself should be described briefly. Second, a structured literature review on the application of protection motivation theory in privacy research should be undertaken.

Readings on the Topic (T) and possible Methods (M)

T: Rogers, R.W. 1975. "A protection motivation theory of fear appeals and attitude change," Journal of Psychology (91:1), pp. 9-114.

T: Youn, S. 2009 "Determinants of online privacy concerns and its influence on privacy protection behaviors among young adolescents," Journal of Consumer Affairs (43:3), pp. 398-418

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review,” MIS Quarterly (26:2), pp. 13-23.

Supervisor

Sabrina Hauff, M.Sc.

Title

6) How to deal with information privacy concerns - An organizational perspective

Goal

Many internet users have privacy concerns when performing online activities like online shopping or using social networks. These concerns have been shown to negatively influence users' intention to share personal information. Yet, in the end they often provide information when being in actual situation.

Aim of this master seminar paper is to analyze the role of organizations in this process: Which mechanisms and behavior can they apply to either mitigate or overrule privacy concerns? Therefore, a structured literature review should be conducted. The work should structure the results of previous studies in a comprehensive way in order to provide researchers with an understanding of the current scientific knowledge on this topic and potential avenues for future research.

Readings on the Topic (T) and possible Methods (M)

T: Zimmer, J. C., Arsal, R., Al-Marzouq, M., Moore, D., and Grover, V. 2010. “Knowing your Customers: Using a Reciprocal Relationship to Enhance Voluntary Information Disclosure,” Decision Support Systems (48:2), pp. 395–406.

T: Liu, C., Marchewka, J.T. et al. 2004. "Beyond concern: a privacy-trust-behavioral intention model of electronic commerce," Information & Management (42:1), pp. 127-142.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review,” MIS Quarterly (26:2), pp. 13-23.

Supervisor

Sabrina Hauff, M.Sc.

Title

7) The perspective of privacy calculus - chances and limitations

Goal

Privacy calculus is a common approach to study the joint effect of opposing forces on privacy perception and privacy-related behavior.The theory suggests that a person's information disclosure behavior is based on a calculus in which a person weights risks and benefits. To give an example: Facebook offers its service for free. Thus you can easily connect with your friends and share all kinds of information with them, thereby staying in contact with them. On the other hand, you risk that Facebook monetizes your information. You might get personalized advertisements, for example. If you now rationally weight the benefits against the risks to decide whether to disclose personal information or not, you apply a privacy calculus.

The aim of this master seminar thesis is to conduct a structured literature review bringing together insights from previous literature to explain whether and how a privacy calculus is applied and where its limitations are. The work should identify the relevant literature streams and structure the results of previous studies in a comprehensive way in order to provide researchers with an understanding of the current scientific knowledge on this topic and avenues for future research.

Readings on the Topic (T) and possible Methods (M)

T: Dinev, T., and Hart, P. 2006. “An Extended Privacy Calculus Model for E-Commerce Transactions,” Information Systems Research (17:1), pp. 61–80.

T: Xu, H., Teo, H.-H., Tan, B. C., and Agarwal, R. 2009. “The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services,” Journal of Management Information Systems (26:3), pp. 135–174.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review,” MIS Quarterly (26:2), pp. 13-23.

Supervisor

Sabrina Hauff, M.Sc.

Title

8) General and situational information privacy concerns - A literature review

Goal

Privacy concerns are used as the central construct in existing privacy research. They refer to the worries or anxieties that people associate with a potential loss of privacy. Recently, the issue of differentiating general and situation-specific privacy concerns was raised, arguing that macro-environmental and socio-relational factors on the one hand and organizational and task-environmental factors on the other hand pose distinct impacts on these two types of concerns (Li 2011).

Aim of this master seminar paper is to conduct a structured literature review that investigates the differences and similarities of these two types of concerns and their relationship.The work should identify the relevant literature streams and theories and thereby structure the results of previous studies in a comprehensive way to provide researchers with an understanding of the current scientific knowledge on this topic and avenues for future research.

Readings on the Topic (T) and possible Methods (M)

T: Joinson, A. N., Reips, U.-D., Buchanan, T., and Schofield, C. B. P. 2010. “Privacy, Trust, and Self-Disclosure Online,” Human–Computer Interaction (25:1), pp. 1–24.

T: Li, Y. 2011. “Empirical Studies on Online Information Privacy Concerns: Literature Review and an Integrative Framework,” Communications of AIS (28), pp. 453–496.

M: Webster, J., and Watson, R. T. 2002. “Analyzing the Past to Prepare for the Future: Writing a Literature Review,” MIS Quarterly (26:2), pp. 13-23.

Supervisor

Sabrina Hauff, M.Sc.


 


weitere Informationen zu der Lehrveranstaltung:

empfohlenes Studiensemester der Lehrveranstaltung: im 1. Semester
Fachrichtung Lehrveranstaltung: Master
Dauer der Lehrveranstaltung: 4 SWS
Typ der Lehrveranstaltung: S - Seminar
Leistungspunkte: 6 ECTS
Bereich: Profilierung: Wirtsch.-Inf. für iBWL; Master Informatik & Informationswirtschaft (Modulgruppe WI)
Prüfung: Referat / Hausarbeit
Semester: jedes WS